And There You Have IT!
To listen to an audio podcast, mouse over the title and click Play. Open iTunes to download and subscribe to podcasts.
Is your organization agile and secure enough to survive? Join Cherie Caswell Dost, former Chicago Public Radio host, as she chats with industry leaders about information technology trends and their impact on people, business, and our world. From IT security to cloud technology, learn how your business can not only survive, but thrive. Presented by Forsythe.
||CleanZero Trust Architecture: Debunking Myths||Learn how Zero Trust architecture is helping companies prevent the exfiltration of sensitive data and defend against modern cyberthreats.||2/7/2018||Free||View in iTunes|
||CleanFlex Your IT Super Powers with Virtualization||A virtualized approach can enable IT to move as fast as the business demands without compromising the security or availability of critical applications.||12/21/2017||Free||View in iTunes|
||CleanRoadmap to Digital Transformation by 2020||A digital transformation really means a business transformation. Learn how to get started by creating a vision for your company and shifting to a hyperconverged storage model.||12/19/2017||Free||View in iTunes|
||CleanConvergence versus Hyperconvergence: Which Horse Should You Back in the Race to Storage Modernization||Learn how to find the right partner and solution so that your business can realize the benefits of storage modernization.||12/13/2017||Free||View in iTunes|
||CleanHow IT Simplification can Strengthen and Secure Your Healthcare Brand||The healthcare industry has notoriously complex systems. IT simplification has never been more critical to modernization. Learn about technical and operational approaches to IT simplification.||12/11/2017||Free||View in iTunes|
||CleanThe Future of IoT Relies on Cybersecurity||As The Internet of Things (IoT) evolves, so must risk calculation and security strategies. Get an inside look at the state of IoT security.||12/5/2017||Free||View in iTunes|
||CleanUNIX Isn’t Dead: Debunking the Myth and Discovering the Value of UNIX||UNIX continues to defy the negative myths that surround it. Learn how businesses are still benefiting from UNIX.||11/21/2017||Free||View in iTunes|
||CleanMachine Learning: How to Reap the Benefits and Avoid the Risks||Find out how your business can benefit from machine learning tools and stay secure in the process.||11/15/2017||Free||View in iTunes|
||CleanHow to Make Hyperconvergence a Smooth Operation||From configuration to implementation, we take a look at how to smoothly deploy hyperconverged infrastructure.||10/31/2017||Free||View in iTunes|
||CleanHyperconvergence in Real Time||Hyperconverged platforms are enabling innovation and disruption. Is your company ready to do the same?||10/24/2017||Free||View in iTunes|
||CleanThe Internet of Human Things: Making Meaningful Connections with IoT||To drive business and solve real world problems, Internet of Things (IoT) innovators are focusing on the human connections that drive the technology.||10/12/2017||Free||View in iTunes|
||CleanThe Secret Life of Cloud Costs||Don’t let hidden costs disrupt your migration. Here’s how you can optimize your cloud spend.||6/14/2017||Free||View in iTunes|
||CleanWeaponized Smart Devices and the Internet of Things||As companies increase adoption of IoT devices, cyber attackers continue to take advantage of the security risks they present.||5/31/2017||Free||View in iTunes|
||CleanThe General Data Protection Regulation is Changing IT Security: Are You Ready?||The GDPR and regulations like it are changing the way companies need to approach data security. Learn why enterprises should consider this an opportunity, not a nuisance.||5/24/2017||Free||View in iTunes|
||CleanWannaCry and the Evolution of Ransomware||Cyber extortion is skyrocketing as ransomware grows in sophistication. Learn how your organization can take proactive steps to protect your data from WannaCry-like attacks.||5/17/2017||Free||View in iTunes|
||CleanPillar Six: Identity and Access Management [Six Pillars of Security]||When it comes to identity and access management (IAM), short cuts aren’t an option. With the right strategy, IAM tools can help you build effective security without sacrificing efficiency.||5/9/2017||Free||View in iTunes|
||CleanPillar Five: Data Center and Cloud Security [Six Pillars of Security]||Many organizations continue to struggle with security implications associated with the cloud. Weaknesses in a cloud or colocation vendor’s security can have a dramatic impact on your organization’s overall security posture.||5/3/2017||Free||View in iTunes|
||CleanPillar Four: Application Security [Six Pillars of Security]||Applications have become an integral part of everyday life, and they contain some of your customers’ most confidential data. Explore how the rapid pace of development is affecting application security.||4/25/2017||Free||View in iTunes|
||CleanPillar Three: Security Compliance and Governance [Six Pillars of Security]||Compliance is essential, but it does not equal security. Learn how to help your organization become more secure, and not merely compliant.||4/18/2017||Free||View in iTunes|
||CleanPillar Two: Threat and Vulnerability Management [Six Pillars of Security]||If you know how cyber criminals think, you can gain a brand new perspective on your threat and vulnerability management.||4/12/2017||Free||View in iTunes|
||CleanPillar One: Data Protection [Six Pillars of Security Series]||Protect your data from evolving IT changes and targeted attacks by shifting a to data-centric security strategy.||4/4/2017||Free||View in iTunes|
||CleanBe Tomorrow: Forecasts Shift to Hybrid Cloud||Adapt to the hybrid cloud, or get left behind.||1/5/2017||Free||View in iTunes|
Looks like I am the first to review this. I stumbled upon this searching for IT related podcasts. The first episode was a very interesting, thorough discussion on hybrid cloud. Would be interested to listen to more episodes.
Very current and on point. Great for a listen on the drive home.
I've only listened to the first Podcast in the series and already I'm hooked.
Very informative and really is a deep dive into security challenges we face today.
Look forward to more.