Stitcher for Podcasts

Get the App Open App
Bummer! You're not a
Stitcher Premium subscriber yet.
Learn More
Start Free Trial
$4.99/Month after free trial

Episode Info

Episode Info: In Episode #38 Bill interviews Eric Vanderburg, a thought-leader and Director of Information Systems and Security at JurInnov, a cyber security and forensics company that helps businesses get back on their feet following a security breach.  Listen as Bill and Eric discuss life as “Sherriff of the Internet,” virtual versus augmented reality, and various elements of upscale IT security.  Sponsored By: CIO Security Scoreboard – Go to to learn more about how to communicate the status of your IT Security program visually and in minutes. Time Stamped Show Notes: 01:40 – Bill welcomes Eric to the show 02:01 – What it’s like being the “Sherriff of the Internet”? 03:10 – Microsoft Hololens—Microsoft’s take on Google Glass 04:48 – Eric defines an innovative, real world application for Microsoft Hololens 05:47 – Fashion 07:31 – Other applications for Hololens 07:59 – Video conferencing 08:53 – Eric defines his idea generating process 09:39 – Virtual reality is cutting us away from the real world, whereas augmented reality allows reality and the virtual to coexist 10:49 – The problem with technology is that it allows us to connect at such grand scale that—in some ways—it prevents us from actually connecting 11:30 – Virtual reality and augmented reality are both industry terms 12:19 – How Eric forms his ideas and brings them to market 13:27 – Eric’s top 2-3 sites for leveraging security information 14:44 – Ideas can be lost real fast—capture them as they arise 16:09 – David Cross of Microsoft Azure 16:50 – Muse 18:58 – Data can help us to train our brains 19:19 – Heartmath 21:25 – The medical device industry is growing at 400% per year in terms of technological advancement 21:46 – Explaining corporate espionage and how inter-company hacks work 23:34 – The dark web makes it incredibly easy to perform corporate espionage 24:44 – Countries go through a maturity process where technologies are simply stolen 27:00 – Eric’s role as an expert witness in IT Security trials 29:15 – The importance of the investigative track 30:00 – eDiscovery as it pertains to email and file systems 31:09 – Before adopting a technology, you need to fully understand and appreciate all the potential impact it can have 32:20 – You can say something 1000x times but until it actually happens to them, most people don’t pay attention to all the risks 33:08 – Top questions for a CIO to ask to start the impetus to plan for an attack 36:48 – Hybrid clouds versus full-cloud deployments 38:44 – When data is in unstructured file types, the normal tools used to run against it are ineffective 39:46 – Subtopic for a CIO Mastermind—finding qualified talent 41:01 – How AI will impact IT Security and Business IT Leadership moving forward 42:26 – Theses days, data is used to gather even more data, which is then used to create revenue 43:00 – Bots are just the new wave of malware 43:27 – We ...
Read more »

Discover more stories like this.

Like Stitcher On Facebook


Episode Options

Listen Whenever

Similar Episodes

Related Episodes