PICNIC-Podcast by Ipswitch

PICNIC-Podcast by Ipswitch header image 1

Equifax Breach – How Does It Impact End-Point Security?

880x440-episode16-kevin-monahan.png

In this PICNIC episode, we will welcome David Monahan, Research Director at Enterprise Management Associates.

David is a senior information security executive with several years of experience. He has organized and managed both physical and information security programs, including security and network operations (SOCs and NOCs) for organizations ranging from Fortune 100 companies to local government and small public and private companies. He has diverse audit and compliance and risk and privacy experience such as providing strategic and tactical leadership to develop, architect, and deploy assurance controls; delivering process and policy documentation and training; and working on educational and technical solutions.

Prior to joining Enterprise Management Associates, David spent almost 10 years at AT&T Solutions focusing on the network security discipline. He was a key leader in organizing and supporting AT&T's Managed Security Services operations where he ultimately supported over 700 customers globally. In 2004, he leveraged that experience to begin provide support to the SME and SMB markets, working internally to bolster struggling security organizations. He has been sought after by public and privately held companies and local government, including Network Appliance, McData, and Jefferson County, Colorado, to help them manage their information security, compliance privacy, and IT risk programs. 

Aside from his full-time practice in the security field, David has been an adjunct faculty member for Capitol College in Laurel, Maryland since 2007, providing security instruction at the undergraduate and graduate levels. 

David has presented briefings to numerous forums including SANSFire, Forrester, and the Colorado Digital Government Conference. He has contributed content to a wide variety of industry forums and periodicals, including State Tech, CIO, CSO, and Computer World Magazines

During today’s episode, we want to spend a bit of time answering a few points:

  • What do think about the Equifax breach and how it will actually affect consumers?
  • If this is such a threat, why haven’t we seen any increase in identity theft using the data?
  • What are the top three things you recommend consumers do to protect themselves or decrease the odds of their information being exploited?
  • Equifax was huge but not the only instance of personal information theft. What can individuals do to avoid having their personal information stolen from them in the larger context of using the Internet and service providers?
  • How can people protect their information at home?

Spotlight on the Dark Web: business and individual identity

00:0000:00

880x440-episode15-kevin-lancaster.png

In this week's PICNIC episode, we welcome Kevin Lancaster, CEO, ID Agent. Kevin has served as Chief Executive Officer of ID Agent since its founding in 2015. Kevin also serves as CEO of the Winvale Group, a leading provider of advisory, research and strategic consulting services to government contractors across various industries and disciplines, since co-founding the company in 2003. In early 2017, he founded GovernmentContract.com, which provides education and training for businesses to successfully sell to the federal government. Kevin is an Executive Committee and Board of Directors member of the Maryland Tech Council and serves on the board of directors for the Navy Youth Hockey Association.

Kevin and his companies have earned several industry awards and accolades, including twice winning SmartCEO’s Future 50 Award and four times appearing on the Inc. 5000, the annual ranking of the fastest-growing private companies in America. He has been interviewed by the Washington PostGovernment ExecutiveMSPmentor, CBS and many other news outlets. Kevin frequently speaks to domestic and international audiences on privacy, identity monitoring, cyber security and the Dark Web, government contracting strategy and relations, and technology trends impacting the private and public sectors.

In today’s episode, we spend a bit of time studying and answering a few points:

  • What is the dark web and why should I care?
  • Why do personal identity breaches matter to businesses? (i.e. Is a company is at risk when its employees suffer personal identity theft? YES!)
  • What part does dark web monitoring play in a business continuity plan?
  • Cyber Monday starts the seasonal spike for digital identity theft. What are the top 3 things businesses should be doing to protect themselves?
  • What’s the Dark Web really, and why should businesses worry about it? 
  • Why do personal identity breaches matter to businesses? (i.e. Is a company is at risk when its employees suffer personal identity theft?)
  • What part does DW monitoring play in a business continuity plan?
  • Cyber Monday starts the seasonal spike for digital identity theft. What are the Top 3 things individuals should be doing to protect themselves?
  • What are Top 3 recommendations for businesses to do 
  • If I change my passwords, isn’t that enough? 

The Digital War Room

00:0000:00

880x440-episode14-dennis-drogseth.png

In Today’s PICNIC episode, we will welcome a returning guest: Dennis Drogseth, EMA (enterprise Management Associates) Vice President.

Dennis joined EMA in 1998 and currently manages the New Hampshire office. Dennis brings over thirty years of experience and supports EMA through leadership in Business Service Management (BSM), CMDB Systems, automation systems and service-centric financial optimization. Dennis also works across practice areas to promote dialogs across critical areas of technology and market interdependencies. Prior to this, Dennis helped to build the network management practice area at EMA. 

At EMA, Dennis has pioneered research in converging management strategies such as performance/availability and integrated security. Another focus is on changing organizational dynamics in IT, such as issues between the service desk and the operation center, and the emergence of a cross-domain, “service management” organization in more mature IT organizations. Dennis works extensively with vendor clients to help establish meaningful product positioning within an overcrowded marketplace, as well as with IT clients seeking to establish effective baselines for strategic management initiatives. He is a speaker on many management related issues. 

Prior to joining EMA, Dennis worked to develop marketing strategies and new business models for Cabletron’s SPECTRUM management software. He initiated a pilot program for a new software marketing organization based on a flexible, entrepreneurial dynamic. Dennis also coordinated a broad marketing effort to reposition SPECTRUM away from element management toward a robust SLM niche. Before Cabletron, Dennis spent 14 years with IBM in marketing and communications, including a year of international consulting on best practices for bringing networking solutions to market. 

At the occasion of today’s episode, we want to spend a bit of time on the digital war room and ask ouservles…

  • What the “digital war room” really is
  • What technologies Dennis foresees as shaping the digital war room most dramatically in the present/future?
  • Dennis has recently written a buyer’s guide on advanced IT analytics and we would like to know more about their potential impact
  • What we should expect as the impact of DevOps/ agile on the digital war room? What about the impact of cloud—and public cloud in particular?
  • What will the future be for the digital war room? Will there even be a war room?

Has your company turned you into a social engineering lab rat?

00:0000:00

880x440-episode13-arun-vishwanath.png

 

In this PICNIC episode, we welcome Arun Vishwanath to talk about The Psychology of Users Falling for Social Engineering Tactics.  The host is Greg Mooney.

Arun Vishwanath, Ph.D., MBA, is Associate Professor at the University at Buffalo and Faculty Associate at the Berkman Center for Internet and Society at Harvard University. 

Arun’s research focuses on the “people problems” of cyber security. His particular interest is in understanding why organizational insiders willingly exfiltrate sensitive organizational data, why people become unintentional insiders by falling prey to social engineering attacks, and on ways we can harness this understanding to secure cyber space 

His research has been presented at leading outlets from the Johns Hopkins Applied Physics Lab to the U.S. Army Cyber Institute at West Point and BlackHat.

Arun has authored more than two-dozen peer reviewed research papers on the science of cyber security and is a frequent CNN opinion contributor. His work has been cited in leading outlets from Scientific American to Wired Magazine

During today’s episode, we will discuss topics such as election hacking, social engineering and so much more.

Join us on Thursday November 9 at 3:00 pm ET!

PowerShell, what and why?

00:0000:00

880x440-episode12-adam-bertram.png

In Today’s PICNIC episode, our host Greg Mooney welcomes Adam Bertram and his guests Jeffrey Hicks and Michael Greene. We'll be having a discussion, in a roundtable format, on the "whats" and "whys" of this popular scripting language.

A little bit about our guests:

Adam Bertram is Chief Automator at Adam the Automator LLC. He is an automation engineer, blogger, independent consultant, freelance writer, author, trainer, and presenter. Adam focuses on DevOps, system management, and automation technologies as well as various cloud platforms. He is a Microsoft Cloud and Datacenter Management MVP, a passionate learner and efficiency nerd that enjoys teaching others a better way to leverage automation. You can find Adam at is adamtheautomator.com blog, LinkedIn or on Twitter at @adbertram.

Jeffery Hicks is an IT veteran with over 25 years of experience, much of it spent as an IT infrastructure consultant specializing in Microsoft server technologies with an emphasis in automation and efficiency. He is a multi-year recipient of the Microsoft MVP Award. He works today as an independent author, teacher and consultant. Jeff has taught and presented on PowerShell and the benefits of automation to IT Pros worldwide. Jeff has authored and co-authored a number of books, writes for numerous online sites and print publications, is a contributing editor at Petri.com, a Pluralsight author, and a frequent speaker at technology conferences and user groups.

Michael Greene is a Principal Program Manager at Microsoft and is lead program manager for the Desired State Configuration (DSC) product. Michael is also co-lead for Azure DSC, and community manager for Azure Security & Operations Management Services.

During today’s roundtable, our host and guests will cover questions every IT pro has:

  • Top three reasons to why someone would want to learn PowerShell
  • The biggest blocker that prevents more people from using PowerShell
  • The most rewarding story heard from an IT professional that had adopted PowerShell
  • Microsoft action plan to work with the community

Marketing Automation Importance

00:0000:00

880x440-episode10-robert-woodbury.png

In this week's PICNIC episode, we will welcome Robert Woodbury Jr, Ipswitch Global Marketing Programs Manager.

Robert joined Ipswitch in February 2016 and currently manages the creation and execution of global marketing programs for Ipswitch. Robert’s role at Ipswitch began as a member of the Demand Generation Team, focusing on Data Management and International Marketing program execution. Throughout his time with the Ipswitch Marketing Team, his experience managing two Marketo instances along with multi-channel marketing initiatives, has made him a valuable and proven Marketing Operations professional.

Outside of working at Ipswitch, Robert enjoys spending time with his two cats: Oliver and Pumpkin, watching all Boston sports teams, and enjoying his favorite cold brew coffee.

At the occasion of today’s episode, we will answer one key question: Why is marketing automation important to any (IT) organization?

15 Key Attributes of Modern IT Operations

00:0000:00

880x440-episode10-bojan-simic.png

In Today’s PICNIC episode, we will welcome Bojan Simic, Founder at Digital Enterprise Journal.

Bojan Simic is Founder of Digital Enterprise Journal, a media and research firm focused on digital transformation and the business value of technology deployments. Bojan has been an analyst and entrepreneur in the enterprise technology industry for more than 10 years.

As an industry analyst, Bojan has interviewed tens of thousands of IT and business professionals from end-user organizations and has published more than 100 research reports. Bojan is frequently quoted in leading industry publications and he has presented his research findings at hundreds of market-facing events.

Prior to launching Digital Enterprise Journal, Bojan was President and Principal Analyst at TRAC Research, a market research and analyst firm specializing in IT performance management.

Simic holds a B.A. in Economics from Belgrade University in Belgrade, Serbia and an M.B.A. from McCallum Graduate School of Business at Bentley University.

At the occasion of today’s episode, we will talk about IT Operations Attributes and answer questions such as:

  • What is the difference between artificial intelligence and machine learning?
  • What are the key drivers for organizations for modernizing IT operations?
  • What are some of the key changes that you have been seeing in this market over last few years?
  • What is the business impact of modernizing IT operations?
  • What types of technology capabilities are critical for modern IT operations?
  • Does digital transformation change the role that IT operations play in the enterprise?
  • Can modern IT operations make the IT more strategic and how?

Security Analytics, and the application of machine learning to security analytics

00:0000:00

880x440-episode8-mike-paquette.png

In Today’s PICNIC episode, we will welcome Mike Paquette Director of Product, Security Market at Elastic.

Mike joined Elastic in 2016 from Prelert, where he'd been VP of Products for Prelert's machine learning technology.  Mike's focus at Elastic is to help users and customers succeed with security-related applications of the Elastic Stack.  Mike has over 30 years of technology product development experience, including leadership roles with several startups.  He has worked in development of SIEM solutions, and spent 14 years developing and bringing to market network IPS and DDoS Defense solutions at Top Layer Security, where he also led development of network monitoring solutions.
Mike has written white papers on IPS and published security-related articles in Health Management Technology Magazine, ISSA Journal, Dark Reading, HowToLearn.com, and other industry publications. He has a BSEE from Boston University and is co-author of a patent on DDoS protection.

At the occasion of today’s episode, we will talk about Security Analytics and their application with machine learning. It is the right time to ask ourselves:

  • What’s the difference between artificial intelligence and machine learning?
  • Are there multiple types of machine learning?
  • Is Artificial Intelligence going to reduce the number of people needed in security analyst jobs?
  • Can machine learning be used to detect threats?
  • Can machine learning be used to identify malicious software?
  • What’s the story behind ramsonware?

Investing in innovation in IT analytics.

00:0000:00

880x440-Guestcard-ep8-dennis-drogseth.jpg

In Today’s PICNIC episode, we will welcome Dennis Drogseth, EMA (enterprise Management Associates) Vice President.

Dennis joined EMA in 1998 and currently manages the New Hampshire office. Dennis brings over thirty years of experience and supports EMA through leadership in Business Service Management (BSM), CMDB Systems, automation systems and service-centric financial optimization. Dennis also works across practice areas to promote dialogs across critical areas of technology and market interdependencies. Prior to this, Dennis helped to build the network management practice area at EMA. 

At EMA, Dennis has pioneered research in converging management strategies such as performance/availability and integrated security. Another focus is on changing organizational dynamics in IT, such as issues between the service desk and the operation center, and the emergence of a cross-domain, “service management” organization in more mature IT organizations. Dennis works extensively with vendor clients to help establish meaningful product positioning within an overcrowded marketplace, as well as with IT clients seeking to establish effective baselines for strategic management initiatives. He is a speaker on many management related issues. 

Prior to joining EMA, Dennis worked to develop marketing strategies and new business models for Cabletron’s SPECTRUM management software. He initiated a pilot program for a new software marketing organization based on a flexible, entrepreneurial dynamic. Dennis also coordinated a broad marketing effort to reposition SPECTRUM away from element management toward a robust SLM niche. Before Cabletron, Dennis spent 14 years with IBM in marketing and communications, including a year of international consulting on best practices for bringing networking solutions to market. 

At the occasion of today’s episode, we will talk about Investment in IT Innovation and Analytics and will cover points and questions such as:

  • What is advanced IT analytics and how is it different from IT operational Intelligence?
  • Why did Dennis choose to do a buyer’s guide in this area?
  • What’s was required to participate? What technologies in specific was he looking for?
  • What he discovers any surprises in the course of the research? If so, what were they?

How does he see the AIA arena evolving in the next two years?

IT in the News

00:0000:00

880x440-episode7-greg-mooney.png

In Today’s PICNIC episode, we will welcome Greg Mooney, Ipswitch Evangelist.

Greg joined Ipswitch 2 years ago as a technologist and data geek with over 10 years of background in tech industry. He has worked in a variety of industries as an IT manager and software tester. Greg is an avid writer on everything IT related, from cyber security to troubleshooting. He hosts two podcasts, Defrag This and The Data Transfer Show.

Today’s episode will be the occasion for Greg to discuss with our host about recent IT news and trends. Make sure to listen to the live podcast and give us a phone call if you have any thought or comment about the on-going discussion.