PICNIC-Podcast by Ipswitch

PICNIC-Podcast by Ipswitch header image 1

Intent Based Networking (IBN)

00:0000:00

880x440-episode25-ray.png

 

In Today’s PICNIC episode, we will welcome Ronnie Ray, Sr. Director – Product Management for DNA in the Enterprise Networking Business in Cisco.

In his role, Ronnie leads product strategy, roadmap and business execution for software controller, analytics and assurance products for the Enterprise Network including DNA Center and associated management software. Ronnie has over 18 years of experience in driving management software products across networks, datacenter, cloud and applications in his own startups or as a marketing and product leader in both public and private companies.

At the occasion of today’s episode, we will discuss Intent Based Networking (IBN) and try to answer:

  • What it means
  • What are the benefits of IBN?
  • What will be the customer journey on IBN?
  • How will IBN affect the current vendor landscape?
  • What is Cisco’s strategy in IBN?

17 Areas Shaping the IT Operations Market in 2018

880x440-episode24-bojan-simic.png

In Today’s PICNIC episode, we will welcome a returning guest, Bojan Simic, Founder at Digital Enterprise Journal.

Bojan Simic is Founder of Digital Enterprise Journal, a media and research firm focused on digital transformation and the business value of technology deployments. Bojan has been an analyst and entrepreneur in the enterprise technology industry for more than 10 years.

 As an industry analyst, Bojan has interviewed tens of thousands of IT and business professionals from end-user organizations and has published more than 100 research reports. Bojan is frequently quoted in leading industry publications and he has presented his research findings at hundreds of market-facing events.

Prior to launching Digital Enterprise Journal, Bojan was President and Principal Analyst at TRAC Research, a market research and analyst firm specializing in IT performance management.

Simic holds a B.A. in Economics from Belgrade University in Belgrade, Serbia and an M.B.A. from McCallum Graduate School of Business at Bentley University.

At the occasion of today’s episode, we will talk about a recent survey released by Digital Enterprise Journal (DEJ) about “17 Areas Shaping the IT Operations Market in 2018”.

Some of the key findings include:

  • 24% - are looking invest in new IT Operations solutions in next 12 months to be able to manage microservices and containers
  • 52% - reported advanced analytics and automation capabilities as the key driver for network monitoring in 2018
  • 54% - reported that network monitoring for Cloud and virtualized environments is becoming major requirement for 2018

The study is based on insights from more than 2,500 end-users, includes hundreds of data points and is produced by using DEJ's unique approach for ongoing data collection and analysis as well as the company TPO (Maturity Class Framework) methodology.

This will be the occasion for us to use this survey and discuss what it means in terms of:

  • IT Operations Context
  • Intelligent Automation
  • New Technologies Changing the Market Landscape
  • User Experience the Key Focal Point
  • Market Growth Requirements
  • Proactive versus Reactive Approaches
  • Beyond Monitoring
  • Automation, AI and Machine Learning
  • Digital Transformation
  • Service-Centric Approach
  • Security Initiaives
  • Cloud Management
  • Competitive landscape
  • And a lot more from this survey!

Things We Hate About New Devices

00:0000:00

880x440-episode22-hating-devices.png

In Today’s PICNIC episode, we welcome a few of our friends at Ipswitch, all passionate about their job and new technologies.

First our hosts, Kevin Conklin and Greg Mooney! No need to introduce them anymore after more than 20 episodes!

Alex Fisher is a Web marketer deeply involved in all aspects of online strategy. Alex specializes in web design, social media, information architecture, usability, A/B testing, landing page optimization and really well knows and understands end-users.

Jeff Edwards is an experienced writer, editor, and marketing professional dedicated to shedding light on the struggles of the modern IT team and in unlocking the mysteries of information security for the layperson.

Mark Towler is a Marketing Strategist specialized in Messaging and Lead Generation. To do so, Mark understands users and translates complex technical concepts into benefit-oriented messaging to answer his audience’s needs. Proficient with software, hardware, cloud/SaaS, B2B, B2C Mark specializes in Carrier and enterprise networking including core-to-edge switching products and service assurance as well as telecommunications and high-tech in general.

Some of the questions we would love to discuss/debate today are:

  • Vendors handling of updates, such as throttling performance on old phones and their excuse for doing so
  • Vendors pushes people to buy wireless headphones to remove the headphone jack. Has they overstepped its bounds?

How I Learned to Stop Worrying and Love GDPR

00:0000:00

880x440-episode21-steve-staden.png

In Today’s PICNIC episode, we are pleased to welcome our dear friend Steve Staden, CISSP, Senior Director of Product Management at Ipswitch.

Steve Staden has served Ipswitch for nearly a decade in various product management roles. Currently, he is head of the company’s secure file management and network monitoring group. He also spearheads Ipswitch’s efforts to achieve GDPR compliance in its operations as well as on-premise and cloud-based product offerings. Specialties include security, analytics, managed file transfer, log management, network management and systems management. For more information: https://www.linkedin.com/in/sstaden/

During this episode, we will try to answer the key questions related to European GDPR (General Data Protection Regulation) which will be effective May 25, 2018:

  • What’s the biggest pain point around GDPR?
  • Who is impacted by GDPR?
  • What can GDPR be compared to?
  • Why should you even care about GDPR?

What happens after May 25th, the enforcement date?

All Things Passwords

00:0000:00

880x440-episode19-joy-beland.png

In Today’s PICNIC episode, we are pleased to see a returning guest joining us, Joy Beland, President at Pink Hat Technology Management.

Since starting her consulting practice in 1997, Joy’s ability to develop solid and creative technology solutions has brought efficiency and affordability to small and medium businesses alike. Joy began her consulting practice with Hebrew Union College (HUC), for eight years. In her first role as Network Administrator (1997-2004), Joy single-handedly supported five servers and 105 computers. As Joy added more technicians to her team, it enabled her to focus on securing more small business clients, obtain Microsoft Certifications, and align LA IT Girl with the industry’s most notable vendor partners. Her extensive experience in implementing business plans, setting and achieving project goals, and developing workflow processes while utilizing the most efficient technology has resulted in bringing far more to the table than just creative technology solutions.

Picking up momentum in early 2015, Joy’s focus shifted to cyber security. Her philosophy is that offering protection and peace of mind to her clients is paramount, and continues LA IT Girl’s tradition of secure and reliable network support. Joy obtained her Security + certification and trained with the FBI on Ethical Hacking, as well as testing and implementing layers of cyber protection for her own business and her clients.

To address the cybersecurity needs of the community, Joy created Pink Hat Technology Management, a division of LA IT Girl, Inc., to offer security solutions to small and medium business owners in 2016. Joy has gained national attention for her thought leadership in cyber security solutions for small and medium-sized businesses, as she focuses intently on accident response, proactive training, and the best way to communicate gaps in vulnerability with her clients. Joy’s individualized network planning, strict attention to detail, concise communication, and service loyalty make her a well-respected and sought-after IT partner.

In this episode, we will discuss:

  • How to create and remember a strong password?
  • How Password management software can store our passwords in an encrypted format for us on every device?
  • How to monitor whether your password have been stolen and are for sale on the Dark Web?
  • Why it is important to rotate your passwords?
  • What you should NEVER include in your password?

The Evolution of IT Security Threats

00:0000:00

880x440-episode20-scott-foote.png

In Today’s PICNIC episode, we will welcome Scoot Foote, Cybersecurity Expert.

Scott is a senior high-tech executive with more than 30 years of experience in cybersecurity and the broader software industry; serving both the public and private sectors. His primary area of expertise has been information security since the late 1980s; however, Scott’s technical experience ranges from operating system kernel technologies, to the gamut of filesystem / database and info storage, to network engineering, to packaged commercial applications such as SCADA, B2B and CRM solutions. His management experience spans the product lifecycle, with a specific focus on complex systems engineering and solution roadmap planning – including operational prototyping, rapid-growth product evolution, market adaptation, derivative product strategy, and next generation rollout and migration. Since 1995, he has helped to launch or successfully re-invent over a dozen small businesses. Scott is a frequent guest speaker at industry events, sits on a number of advisory boards and has been a member of the board of directors for enswers, Inc., Axixa Corporation, Realocity, Inc., Protinuum, LLC, and the Boston Affiliate of the Susan G. Komen Breast Cancer Foundation. 

During today’s episode, we want to spend a bit of time studying and answering a few points:

  • How did we get here?  To the point where the majority of the commercial infrastructure we rely on today cannot be trusted?
  • Who are these Threat Actors?  How can they continue to prosper and grow in light of so much visibility now on things like massive data breaches?
  • Why is it so hard for Cyber Defenses to keep up with the threat?
  • What major trends do you see unfolding between now and 2020?  Both the evolution of the Threat, and the evolution of Cyber Defenses?
  • What advice do you have for our audience as they watch this global storm-front building on the horizon?

Why IT Professionals Need to Learn to Code

00:0000:00

880x440-episode19-adam-bertram.png

For our first PICNIC episode of 2018, we welcome our friend and returning guest Adam Bertam, Chief Automator at Adam the Automator LLC.

Adam Bertram is an automation engineer, blogger, independent consultant, freelance writer, author, trainer, and presenter. Adam focuses on DevOps, system management, and automation technologies as well as various cloud platforms. He is a Microsoft Cloud and Datacenter Management MVP, a passionate learner and efficiency nerd that enjoys teaching others a better way to leverage automation. You can find Adam at his adamtheautomator.com blog, LinkedIn or on Twitter at @adbertram.

Ever since the introduction of the Infrastructure in the Cloud and DevOps over the past decade, IT professionals have seen a giant pivot in the skill sets that are needed to get the job done. Hardware maintenance and repair is only small part of the job now. Tape backups are being replaced by cloud backups, servers are becoming virtualized, and system administration is being automated to save time. With all that said, that means coding and scripting is coming to the forefront of everything that IT people do. Today we are going to talk about the changes going on in the IT world and if you are an IT professional, why you need to learn how to code.

Questions we will cover with Adam today:

  • As a PowerShell guru, you’ve certainly have been ahead of the game when it comes to scripting and automation in IT. I bet we can’t say the same for many other small and medium businesses. Why do IT pros need to learn to code?
  • So, we are trending in the direction that many of IT’s tasks need to be automated. Do you think there is a shortage of IT pros who have coding skills in the workforce because of this? How does one get started if they have been focused on hardware their whole career, for instance?
  • What if you hate coding and scripting and you work in IT? Is it time to start looking for another career path?
  • I know you are biased towards PowerShell., but if I’m an IT person looking to learn a new language, which language would you recommend and why?
  • Coding has always been tied to being a programmer. Are you saying that all IT pros need to be programmers? That seems like it would be a big leap for a lot of people in this line of work.
  • Could you share some resources that have helped you keep your scripting skills fresh? Any recommendations for the uninitiated?

Infrastructure as Code

00:0000:00

880x440-episode18-adam-betram.png

In Today’s PICNIC episode, we welcome our friend and frequent guest Adam Bertam, Chief Automator at Adam the Automator LLC.

Adam Bertram is an automation engineer, blogger, independent consultant, freelance writer, author, trainer, and presenter. Adam focuses on DevOps, system management, and automation technologies as well as various cloud platforms. He is a Microsoft Cloud and Datacenter Management MVP, a passionate learner and efficiency nerd that enjoys teaching others a better way to leverage automation. You can find Adam at his adamtheautomator.com blog, LinkedIn or on Twitter at @adbertram.

Adam Bertram is also a PowerShell guru and Microsoft MVP. When it comes to PowerShell and using it’s powers to automate tasks in IT, Adam is an encyclopedia on the subject.

The idea of today’s episode is to cover questions such as:

  • What exactly do we mean when we say Infrastructure as Code (IaC)? How does this tie into Infrastructure as a Service?
  • So the big problem that Infrastructure as Code solves for has everything to do with scaling and automation is the means to an end when it comes to this concept of IaC?
  • Would you say that IaC gave birth to the idea of DevOps? I mean you’re essentially developing and infrastructure to scale, so it brings a coding dynamic to the IT field.
  • Why would you use PowerShell as opposed to more popular languages used in IaC, such as Ansible or Ruby on Rails?

The Importance of Human Element in Fighting Cyber Crime

00:0000:00

880x440-episode17-joy-beland.png

In Today’s PICNIC episode, we are pleased to welcome Joy Beland, President at Pink Hat Technology Management.

Since starting her consulting practice in 1997, Joy’s ability to develop solid and creative technology solutions has brought efficiency and affordability to small and medium businesses alike. Joy began her consulting practice with Hebrew Union College (HUC), for eight years. In her first role as Network Administrator (1997-2004), Joy single-handedly supported five servers and 105 computers. As Joy added more technicians to her team, it enabled her to focus on securing more small business clients, obtain Microsoft Certifications, and align LA IT Girl with the industry’s most notable vendor partners. Her extensive experience in implementing business plans, setting and achieving project goals, and developing workflow processes while utilizing the most efficient technology has resulted in bringing far more to the table than just creative technology solutions.

Picking up momentum in early 2015, Joy’s focus shifted to cyber security. Her philosophy is that offering protection and peace of mind to her clients is paramount, and continues LA IT Girl’s tradition of secure and reliable network support. Joy obtained her Security + certification and trained with the FBI on Ethical Hacking, as well as testing and implementing layers of cyber protection for her own business and her clients.

To address the cybersecurity needs of the community, Joy created Pink Hat Technology Management, a division of LA IT Girl, Inc., to offer security solutions to small and medium business owners in 2016. Joy has gained national attention for her thought leadership in cyber security solutions for small and medium-sized businesses, as she focuses intently on accident response, proactive training, and the best way to communicate gaps in vulnerability with her clients. Joy’s individualized network planning, strict attention to detail, concise communication, and service loyalty make her a well-respected and sought-after IT partner.

In today’s episode, we will discuss:
• Security awareness
• Staff training
• Employees skills
• Network health
• Reputation and Dollar saving

Equifax Breach – How Does It Impact End-Point Security?

00:0000:00

880x440-episode16-kevin-monahan.png

In this PICNIC episode, we will welcome David Monahan, Research Director at Enterprise Management Associates.

David is a senior information security executive with several years of experience. He has organized and managed both physical and information security programs, including security and network operations (SOCs and NOCs) for organizations ranging from Fortune 100 companies to local government and small public and private companies. He has diverse audit and compliance and risk and privacy experience such as providing strategic and tactical leadership to develop, architect, and deploy assurance controls; delivering process and policy documentation and training; and working on educational and technical solutions.

Prior to joining Enterprise Management Associates, David spent almost 10 years at AT&T Solutions focusing on the network security discipline. He was a key leader in organizing and supporting AT&T's Managed Security Services operations where he ultimately supported over 700 customers globally. In 2004, he leveraged that experience to begin provide support to the SME and SMB markets, working internally to bolster struggling security organizations. He has been sought after by public and privately held companies and local government, including Network Appliance, McData, and Jefferson County, Colorado, to help them manage their information security, compliance privacy, and IT risk programs. 

Aside from his full-time practice in the security field, David has been an adjunct faculty member for Capitol College in Laurel, Maryland since 2007, providing security instruction at the undergraduate and graduate levels. 

David has presented briefings to numerous forums including SANSFire, Forrester, and the Colorado Digital Government Conference. He has contributed content to a wide variety of industry forums and periodicals, including State Tech, CIO, CSO, and Computer World Magazines

During today’s episode, we want to spend a bit of time answering a few points:

  • What do think about the Equifax breach and how it will actually affect consumers?
  • If this is such a threat, why haven’t we seen any increase in identity theft using the data?
  • What are the top three things you recommend consumers do to protect themselves or decrease the odds of their information being exploited?
  • Equifax was huge but not the only instance of personal information theft. What can individuals do to avoid having their personal information stolen from them in the larger context of using the Internet and service providers?
  • How can people protect their information at home?