Created with Sketch.
23 minutes | Aug 3, 2016
Ep 11: The Most Selfless Job in IT
Episode 11: The Most Selfless Job in IT Cathy Cottrell, former Director of IT at United Way Suncoast, talked with us about her spanning 30-year career in IT. Cathy, now Account Manager at United Way IT Collaborative, shares with us some of the unique challenges of IT in a nonprofit - the importance of investing in technology that not only enables her team to work more effectively but also leverages the trust of community donors.
26 minutes | Jun 24, 2016
Ep 10: The Mechanics of Launching VDI
Ep 10: The Mechanics of Launching VDI Brien Posey has been in the IT trenches for over 2 decades and is a 7-time Microsoft MVP. He joined us to discuss his theories on the transition from physical desktops to VDI. As a bonus, he shared his journey in becoming a Commercial Scientist-Astronaut Candidate.
40 minutes | Jun 1, 2016
Ep 9: A Journey from Information Security to Cyber Security
On our most recent podcast we featured cyber security expert Derek Gabbard from FourV Systems. Derek has spent his multi-decade career working with cyber security systems and protecting assets—which has led him to what he does now, an interesting combination of security and research. These days, there are so many ways to protect your systems, devices and people. What’s not talked about is the resulting data and evaluation of those protective measures. Are they working? Are you identifying risks and then optimizing them? Gabbard says, “We’re basically trying to show you how you evolve.” There’s So Much Data Out There, How Do You Manage It All? Derek states that there’s no perfect way to create a rock-solid correlation between an occurrence within your system and an alert, but with the amount of incoming information they can create metadata that helps refine the process to reach a point where the data is helpful. The more data that is gathered and organized, the more trends, and patterns they can identify as positive or negative as it relates to your individual brand. What Increases Cyber Security Risk? Users. Surprised? Don’t be. Derek mentions that in his experience, users are not acting with malice when they put their systems at risk; they’re just trying to do their jobs as quickly and efficiently as possible. Some of the ways they find to get around things for the sake of speed may put them at risk without even knowing it. What’s the best way to decrease user risk? Training, forced learning, information. The more your users know about different types of risk, the better they will be at avoiding it.
49 minutes | Apr 28, 2016
Ep 8: Finding Balance in IT Innovation & Standardization in Education
Finding Balance in IT Innovation and Standardization in Education Plug in your headphones and kick back, it’s time for episode 8 of IT Time! This week we welcomed Matthew Belardi, the Director of Business Information Systems at Education Affiliates. Matthew joined us to talk about the challenges that educational organizations face when implementing mobile devices in the classroom. Matt has many years of experience moving education systems from archaic platforms into true student information systems. He estimates that he has been to more than 75 schools across the country to affect change in learning management platforms. We have noticed that updating and managing technologies in the professional ecosystem is a growing theme for all industries— check out our discussion about the healthcare system with Christian Boucher here— the education sphere is no different. As technology rapidly advances, new ways to afford, incorporate and maintain devices and software must be addressed. So, how do you educate a child these days? Incorporating new technology into the classroom doesn’t just mean handing an iPad to a child; it also means training teachers, staff and administrators to use them, maintaining and updating the technology through IT services and keeping parents involved. Without all of those moving parts, the system breaks down. Matt explains that despite the creative, innovative nature of education, most school systems are in the midst of addressing those issues and are therefore around three years behind based on the devices they own and the programs they use (hello, Oregon Trail!). Any interesting observations in the classroom? Oddly enough, the importance of using print text (vs. an ebook) when it comes to textbooks or important reading material. Although it seems counter intuitive, studies have shown that students
30 minutes | Mar 31, 2016
Ep 7: Return of the Start Button and Other 2016 Tech Trends
The Return of the Start Button and Other 2016 Tech Trends This week’s podcast guest joins us from Spiceworks, a community of IT pros and platform that offers free tools to make the sysadmin’s life easier. Meet Peter Tsai, Spiceworks’ IT Content Guru who lends his experience in IT to unique technical content that IT pros can’t get enough of. Peter certainly knows the industry; he has a background that includes positions as a sysadmin, programmer, technical writer and server engineer, so the content he is creating (think webcasts, infographics, IT articles and reports) really engages the millions of community members he serves. Our last podcast featuring James Foster from ZeroFOX touched on the trends that we’re seeing in security and social media, so this week we wanted to keep the ‘trend’ ball rolling and see what Peter thinks will be big in IT in 2016. So, what’s Spiceworks? It’s a decade-old community that produces free applications for IT pros to help them do their jobs better. The community fosters conversations about important IT trends and technical topics and encourages members to share knowledge and experiences with the group. Peter mentions that, unlike many other groups and social platforms, the users on Spiceworks have a common career thread and are genuinely interested in helping others solve problems. What can we expect from the rest of 2016? Peter suggests considering the macro workplace conditions in IT: budgets probably aren’t going up, staffing probably won’t increase by much—but requests for things like BYOD and added security will. According to Spiceworks surveys, IT pros are placing malware and ransomware at the top of their concern lists. IT admins and the like will have to find solutions that save them time and accomplish the goals of the organization, all while maintaining the multitude of other tasks they’re responsible for. We believe that’s where simple, time-saving tools like Simplify Printing TX and Si
23 minutes | Mar 8, 2016
Ep 6: Social Media Security: The Latest Threat Vector
How Safe Are You On Social Media? This week we welcome James C. Foster; CEO of Maryland-based security firm ZeroFOX. Foster and his organization are working to protect against threats on social media and other digital communication channels. The ZeroFOX platform is a cloud platform designed to monitor social media entities (accounts, people, keywords, hashtags, etc.) and detect cyber security threats impacting your organization. Foster, a security industry titan sat down to speak with our team to discuss the many threats we face as individuals and as an organization through our activity on social media. Why is Social Media Such a Target? According to Foster, social media is the largest, fastest-growing digital communication platform there has ever been. It outpaced email in 2014 and is on pace to outgrow the web by 2017. For some, especially the growing, tech-dependent generations, it replaces email, text message and other Internet usage with much greater risk. Why is ZeroFOX relevant now? The security technology and best practices haven’t caught up yet. Foster compares our security positioning toward social media to the first generation of email. These days, you would never open an email and download an attachment from an unknown source—assuming a malicious email even penetrated your company’s protection systems. That attitude and behavior is only widely practiced after years of user and protection maturity. Behaviors on social media just aren’t there yet. The Takeaway? Social media isn’t going anywhere. Foster believes that it will become a powerful weapon for companies who embrace it and a major weakness for those who ignore it. Those who learn to enable and harness the power of the major social platforms while creating a corporate strategy for risk management and governance will ultimately succeed.
14 minutes | Feb 22, 2016
Episode 5.5: Apple vs. FBI – More than a single phone.
Bryan Glancey Weighs In: Apple vs. FBI If you’re like us, you’ve been keeping a close watch on the latest news about Apple vs. the FBI in a case that could have serious implications for everyone using an Apple operating system, and beyond. Last week we met with Optio Labs CTO Bryan Glancey to discuss mobile security as it relates to consumer behaviors, listen to the podcast here. This week he is back discussing the latest national news to affect his industry: Apple vs. FBI. Are We Repeating History? This is a difficult case to evaluate. On one hand, any information available to help better understand the plans and actions of San Bernardino terrorist Syed Farook would benefit the teams working to fight terrorism and keep our citizens safe. On the other hand, the ramifications and precedent set by unlocking the phone could undermine trust at the foundations of one of the largest industries in the world. By forcing Apple to unlock this phone, the FBI is opening Pandora’s Box. Bryan mentions that historically, whenever something like this has happened (and it has happened before), the vulnerabilities have become a target and more often than not, they have fallen into the wrong hands. There’s No Turning Back. What if legislation passes to force Apple to ‘unlock’ their own operating system? Would they be able to do it? Bryan discusses what that could mean for the teams who have designed the secure systems: a backdoor may suggest that they haven’t done their jobs correctly and that consumer phones aren’t actually safe. Bryan says, “if the implementation is done properly, the people who are implementing it have no ability to bypass it. It’s only if they did their job poorly that they would be able to bypass it.”
45 minutes | Feb 16, 2016
Episode 5: The Holy Grail of Mobile Device Security
Your Mobile Device’s Most Vulnerable Point? You. This week’s podcast guest really got us thinking about how we use our mobile phones. Bryan Glancey, CTO of Optio Labs joined us in the IT Time studio to share his thoughts on securing mobile devices in the age of BYOD. Bryan has a rich technical and security background, leading organizations like Samsung, Motorola and Mobile Armor. Bryan’s extensive experience in the field makes his approach to mobile security unique: he believes in taking steps to secure the one element of your mobile device that can be the most unpredictable…you. Angry Birds or Work Documents? Both Need to Be Protected. What do you love most about your mobile device? Do you love the ease in which you can lift it from your pocket and in a matter of seconds open a camera to snap a shot of your dog? Do you love learning about a new time-saving app from your favorite tech blogger only to have that same app downloaded and in-use in less than two minutes? If we had to guess, we would bet that your device’s quick and simple usability contributes to your affection. During the podcast, Bryan addresses an interesting dichotomy between the user’s love for a simple personal experience and the professional demand for security while checking email and accessing company data. Adding protection and security takes away from the simple, convenient experience. Would you love your device as much if you had to navigate two-factor authentication each time you wanted to take a picture? The conflict is real and developers are being challenged to create easy to use software that can be regulated and protected without affecting the overall experience. Let’s be honest, you need to be able to play Angry Birds and annotate a document for your boss without either of those experiences affecting each other. The Future of Mobile Security So where are we heading? Bryan discusses what he sees for the future: ‘mobile-first’ design and functionality attitudes, more granular security controls that keep personal user experi
35 minutes | Jan 27, 2016
Episode 4: Shadow IT – The Happy Virus
Shadow IT? It’s Not As Scary As It Sounds This week’s episode of the Tricerat IT Time podcast features James Quigley, CEO of Canvas (check them out!) and frequent TechCrunch contributor. James recently wrote a piece on the growing utilization of Shadow IT that caught our eye, so we were thrilled to have him join us to dig further into the concept. Let’s Take a Look Back. Years ago, when quick advances in technology were a ‘nice-to-have’ and not a necessity; organizations weren’t sitting on the edge of their seats waiting for the next release. James mentions, “there wasn’t somebody who would disrupt your business in six-month’s time if you didn’t deploy the right technology.” Things were released slower. IT departments had more time to evaluate products and software. Enter the Millennial. With a new generation of workers (who, by the way don’t remember life before the Internet) standards and timelines have changed. With that type of pressure to maintain, IT professionals and products are focusing on being flexible for the sake of efficiency, convenience and innovation while also protecting when they know to be important: company data, security and budgets. Shadow IT has since grown out of employee workarounds to make deployments faster and more agile. The Takeaway? The role of the IT admin is changing into a larger role managing data rather than just tools and hardware. The shifts are inevitable, it’s now up to organizations to get on board! Learn more about James’ take on Shadow IT, and his suggestions to make technology work for everyone.
26 minutes | Jan 11, 2016
Episode 3: Legal Lessons in Moving Beyond Courier Service
What We Learned From My Cousin Vinny This week we’re welcoming Craig Kalty of Custom Systems to the studio. Craig has 25 years experience in network integrations and works with several large law firms who are currently striving toward BYOD-friendly environments. In his recent experience, Craig has seen a repeated trend: an increased focus on simplicity and security. There is a lot of confidential information, documents, and photos, (such as the infamous photo from My Cousin Vinny of the 1963 Pontiac Tempest…and not the ’64 Buick Skylark), that need to be safely moved from the hands of one person to another. This need to move information begs the question, are we really ready to say farewell to the courier service? Are clouds safer? Legal IT (like most large IT industries with a lot of valuable data) is making progress, slowly but surely. Craig sees a theme: the law firms aren’t really driving technology, rather the technologies available are drive what the law firms are able to do. For example, the legal courier, and the ‘file room’ they used to frequent has since disappeared due to new data systems and cloud storage. Why send a courier when you can shoot out an email? What has replaced those vanishing couriers? A need for education surrounding cloud systems and security and regulations keeping users in line. Craig explains how legal IT departments are containing their information and managing their security vulnerabilities by managing what types of programs can be run on each type of device. Their biggest adversary? The lawyer’s’ need for convenience and speed. Listen to learn more! The Takeaway? Simplicity and security. Just like the doctors in last week’s episode, the lawyers won’t use the tech if it’s not easy to adopt. Due to a lack of knowledge surrounding the cloud and other storage systems they look to the IT department to keep their actions and data secure. It’s up to the IT pros to pick the most secure option that doesn’t hinder mobility
Terms of Service
Do Not Sell My Personal Information
© Stitcher 2022