PICNIC-Podcast by Ipswitch

PICNIC-Podcast by Ipswitch header image 1

All Things Passwords

880x440-episode19-joy-beland.png

In Today’s PICNIC episode, we are pleased to see a returning guest joining us, Joy Beland, President at Pink Hat Technology Management.

Since starting her consulting practice in 1997, Joy’s ability to develop solid and creative technology solutions has brought efficiency and affordability to small and medium businesses alike. Joy began her consulting practice with Hebrew Union College (HUC), for eight years. In her first role as Network Administrator (1997-2004), Joy single-handedly supported five servers and 105 computers. As Joy added more technicians to her team, it enabled her to focus on securing more small business clients, obtain Microsoft Certifications, and align LA IT Girl with the industry’s most notable vendor partners. Her extensive experience in implementing business plans, setting and achieving project goals, and developing workflow processes while utilizing the most efficient technology has resulted in bringing far more to the table than just creative technology solutions.

Picking up momentum in early 2015, Joy’s focus shifted to cyber security. Her philosophy is that offering protection and peace of mind to her clients is paramount, and continues LA IT Girl’s tradition of secure and reliable network support. Joy obtained her Security + certification and trained with the FBI on Ethical Hacking, as well as testing and implementing layers of cyber protection for her own business and her clients.

To address the cybersecurity needs of the community, Joy created Pink Hat Technology Management, a division of LA IT Girl, Inc., to offer security solutions to small and medium business owners in 2016. Joy has gained national attention for her thought leadership in cyber security solutions for small and medium-sized businesses, as she focuses intently on accident response, proactive training, and the best way to communicate gaps in vulnerability with her clients. Joy’s individualized network planning, strict attention to detail, concise communication, and service loyalty make her a well-respected and sought-after IT partner.

In this episode, we will discuss:

  • How to create and remember a strong password?
  • How Password management software can store our passwords in an encrypted format for us on every device?
  • How to monitor whether your password have been stolen and are for sale on the Dark Web?
  • Why it is important to rotate your passwords?
  • What you should NEVER include in your password?

The Evolution of IT Security Threats

00:0000:00

880x440-episode20-scott-foote.png

In Today’s PICNIC episode, we will welcome Scoot Foote, Cybersecurity Expert.

Scott is a senior high-tech executive with more than 30 years of experience in cybersecurity and the broader software industry; serving both the public and private sectors. His primary area of expertise has been information security since the late 1980s; however, Scott’s technical experience ranges from operating system kernel technologies, to the gamut of filesystem / database and info storage, to network engineering, to packaged commercial applications such as SCADA, B2B and CRM solutions. His management experience spans the product lifecycle, with a specific focus on complex systems engineering and solution roadmap planning – including operational prototyping, rapid-growth product evolution, market adaptation, derivative product strategy, and next generation rollout and migration. Since 1995, he has helped to launch or successfully re-invent over a dozen small businesses. Scott is a frequent guest speaker at industry events, sits on a number of advisory boards and has been a member of the board of directors for enswers, Inc., Axixa Corporation, Realocity, Inc., Protinuum, LLC, and the Boston Affiliate of the Susan G. Komen Breast Cancer Foundation. 

During today’s episode, we want to spend a bit of time studying and answering a few points:

  • How did we get here?  To the point where the majority of the commercial infrastructure we rely on today cannot be trusted?
  • Who are these Threat Actors?  How can they continue to prosper and grow in light of so much visibility now on things like massive data breaches?
  • Why is it so hard for Cyber Defenses to keep up with the threat?
  • What major trends do you see unfolding between now and 2020?  Both the evolution of the Threat, and the evolution of Cyber Defenses?
  • What advice do you have for our audience as they watch this global storm-front building on the horizon?

Why IT Professionals Need to Learn to Code

00:0000:00

880x440-episode19-adam-bertram.png

For our first PICNIC episode of 2018, we welcome our friend and returning guest Adam Bertam, Chief Automator at Adam the Automator LLC.

Adam Bertram is an automation engineer, blogger, independent consultant, freelance writer, author, trainer, and presenter. Adam focuses on DevOps, system management, and automation technologies as well as various cloud platforms. He is a Microsoft Cloud and Datacenter Management MVP, a passionate learner and efficiency nerd that enjoys teaching others a better way to leverage automation. You can find Adam at his adamtheautomator.com blog, LinkedIn or on Twitter at @adbertram.

Ever since the introduction of the Infrastructure in the Cloud and DevOps over the past decade, IT professionals have seen a giant pivot in the skill sets that are needed to get the job done. Hardware maintenance and repair is only small part of the job now. Tape backups are being replaced by cloud backups, servers are becoming virtualized, and system administration is being automated to save time. With all that said, that means coding and scripting is coming to the forefront of everything that IT people do. Today we are going to talk about the changes going on in the IT world and if you are an IT professional, why you need to learn how to code.

Questions we will cover with Adam today:

  • As a PowerShell guru, you’ve certainly have been ahead of the game when it comes to scripting and automation in IT. I bet we can’t say the same for many other small and medium businesses. Why do IT pros need to learn to code?
  • So, we are trending in the direction that many of IT’s tasks need to be automated. Do you think there is a shortage of IT pros who have coding skills in the workforce because of this? How does one get started if they have been focused on hardware their whole career, for instance?
  • What if you hate coding and scripting and you work in IT? Is it time to start looking for another career path?
  • I know you are biased towards PowerShell., but if I’m an IT person looking to learn a new language, which language would you recommend and why?
  • Coding has always been tied to being a programmer. Are you saying that all IT pros need to be programmers? That seems like it would be a big leap for a lot of people in this line of work.
  • Could you share some resources that have helped you keep your scripting skills fresh? Any recommendations for the uninitiated?

Infrastructure as Code

00:0000:00

880x440-episode18-adam-betram.png

In Today’s PICNIC episode, we welcome our friend and frequent guest Adam Bertam, Chief Automator at Adam the Automator LLC.

Adam Bertram is an automation engineer, blogger, independent consultant, freelance writer, author, trainer, and presenter. Adam focuses on DevOps, system management, and automation technologies as well as various cloud platforms. He is a Microsoft Cloud and Datacenter Management MVP, a passionate learner and efficiency nerd that enjoys teaching others a better way to leverage automation. You can find Adam at his adamtheautomator.com blog, LinkedIn or on Twitter at @adbertram.

Adam Bertram is also a PowerShell guru and Microsoft MVP. When it comes to PowerShell and using it’s powers to automate tasks in IT, Adam is an encyclopedia on the subject.

The idea of today’s episode is to cover questions such as:

  • What exactly do we mean when we say Infrastructure as Code (IaC)? How does this tie into Infrastructure as a Service?
  • So the big problem that Infrastructure as Code solves for has everything to do with scaling and automation is the means to an end when it comes to this concept of IaC?
  • Would you say that IaC gave birth to the idea of DevOps? I mean you’re essentially developing and infrastructure to scale, so it brings a coding dynamic to the IT field.
  • Why would you use PowerShell as opposed to more popular languages used in IaC, such as Ansible or Ruby on Rails?

The Importance of Human Element in Fighting Cyber Crime

00:0000:00

880x440-episode17-joy-beland.png

In Today’s PICNIC episode, we are pleased to welcome Joy Beland, President at Pink Hat Technology Management.

Since starting her consulting practice in 1997, Joy’s ability to develop solid and creative technology solutions has brought efficiency and affordability to small and medium businesses alike. Joy began her consulting practice with Hebrew Union College (HUC), for eight years. In her first role as Network Administrator (1997-2004), Joy single-handedly supported five servers and 105 computers. As Joy added more technicians to her team, it enabled her to focus on securing more small business clients, obtain Microsoft Certifications, and align LA IT Girl with the industry’s most notable vendor partners. Her extensive experience in implementing business plans, setting and achieving project goals, and developing workflow processes while utilizing the most efficient technology has resulted in bringing far more to the table than just creative technology solutions.

Picking up momentum in early 2015, Joy’s focus shifted to cyber security. Her philosophy is that offering protection and peace of mind to her clients is paramount, and continues LA IT Girl’s tradition of secure and reliable network support. Joy obtained her Security + certification and trained with the FBI on Ethical Hacking, as well as testing and implementing layers of cyber protection for her own business and her clients.

To address the cybersecurity needs of the community, Joy created Pink Hat Technology Management, a division of LA IT Girl, Inc., to offer security solutions to small and medium business owners in 2016. Joy has gained national attention for her thought leadership in cyber security solutions for small and medium-sized businesses, as she focuses intently on accident response, proactive training, and the best way to communicate gaps in vulnerability with her clients. Joy’s individualized network planning, strict attention to detail, concise communication, and service loyalty make her a well-respected and sought-after IT partner.

In today’s episode, we will discuss:
• Security awareness
• Staff training
• Employees skills
• Network health
• Reputation and Dollar saving

Equifax Breach – How Does It Impact End-Point Security?

00:0000:00

880x440-episode16-kevin-monahan.png

In this PICNIC episode, we will welcome David Monahan, Research Director at Enterprise Management Associates.

David is a senior information security executive with several years of experience. He has organized and managed both physical and information security programs, including security and network operations (SOCs and NOCs) for organizations ranging from Fortune 100 companies to local government and small public and private companies. He has diverse audit and compliance and risk and privacy experience such as providing strategic and tactical leadership to develop, architect, and deploy assurance controls; delivering process and policy documentation and training; and working on educational and technical solutions.

Prior to joining Enterprise Management Associates, David spent almost 10 years at AT&T Solutions focusing on the network security discipline. He was a key leader in organizing and supporting AT&T's Managed Security Services operations where he ultimately supported over 700 customers globally. In 2004, he leveraged that experience to begin provide support to the SME and SMB markets, working internally to bolster struggling security organizations. He has been sought after by public and privately held companies and local government, including Network Appliance, McData, and Jefferson County, Colorado, to help them manage their information security, compliance privacy, and IT risk programs. 

Aside from his full-time practice in the security field, David has been an adjunct faculty member for Capitol College in Laurel, Maryland since 2007, providing security instruction at the undergraduate and graduate levels. 

David has presented briefings to numerous forums including SANSFire, Forrester, and the Colorado Digital Government Conference. He has contributed content to a wide variety of industry forums and periodicals, including State Tech, CIO, CSO, and Computer World Magazines

During today’s episode, we want to spend a bit of time answering a few points:

  • What do think about the Equifax breach and how it will actually affect consumers?
  • If this is such a threat, why haven’t we seen any increase in identity theft using the data?
  • What are the top three things you recommend consumers do to protect themselves or decrease the odds of their information being exploited?
  • Equifax was huge but not the only instance of personal information theft. What can individuals do to avoid having their personal information stolen from them in the larger context of using the Internet and service providers?
  • How can people protect their information at home?

Spotlight on the Dark Web: business and individual identity

00:0000:00

880x440-episode15-kevin-lancaster.png

In this week's PICNIC episode, we welcome Kevin Lancaster, CEO, ID Agent. Kevin has served as Chief Executive Officer of ID Agent since its founding in 2015. Kevin also serves as CEO of the Winvale Group, a leading provider of advisory, research and strategic consulting services to government contractors across various industries and disciplines, since co-founding the company in 2003. In early 2017, he founded GovernmentContract.com, which provides education and training for businesses to successfully sell to the federal government. Kevin is an Executive Committee and Board of Directors member of the Maryland Tech Council and serves on the board of directors for the Navy Youth Hockey Association.

Kevin and his companies have earned several industry awards and accolades, including twice winning SmartCEO’s Future 50 Award and four times appearing on the Inc. 5000, the annual ranking of the fastest-growing private companies in America. He has been interviewed by the Washington PostGovernment ExecutiveMSPmentor, CBS and many other news outlets. Kevin frequently speaks to domestic and international audiences on privacy, identity monitoring, cyber security and the Dark Web, government contracting strategy and relations, and technology trends impacting the private and public sectors.

In today’s episode, we spend a bit of time studying and answering a few points:

  • What is the dark web and why should I care?
  • Why do personal identity breaches matter to businesses? (i.e. Is a company is at risk when its employees suffer personal identity theft? YES!)
  • What part does dark web monitoring play in a business continuity plan?
  • Cyber Monday starts the seasonal spike for digital identity theft. What are the top 3 things businesses should be doing to protect themselves?
  • What’s the Dark Web really, and why should businesses worry about it? 
  • Why do personal identity breaches matter to businesses? (i.e. Is a company is at risk when its employees suffer personal identity theft?)
  • What part does DW monitoring play in a business continuity plan?
  • Cyber Monday starts the seasonal spike for digital identity theft. What are the Top 3 things individuals should be doing to protect themselves?
  • What are Top 3 recommendations for businesses to do 
  • If I change my passwords, isn’t that enough? 

The Digital War Room

00:0000:00

880x440-episode14-dennis-drogseth.png

In Today’s PICNIC episode, we will welcome a returning guest: Dennis Drogseth, EMA (enterprise Management Associates) Vice President.

Dennis joined EMA in 1998 and currently manages the New Hampshire office. Dennis brings over thirty years of experience and supports EMA through leadership in Business Service Management (BSM), CMDB Systems, automation systems and service-centric financial optimization. Dennis also works across practice areas to promote dialogs across critical areas of technology and market interdependencies. Prior to this, Dennis helped to build the network management practice area at EMA. 

At EMA, Dennis has pioneered research in converging management strategies such as performance/availability and integrated security. Another focus is on changing organizational dynamics in IT, such as issues between the service desk and the operation center, and the emergence of a cross-domain, “service management” organization in more mature IT organizations. Dennis works extensively with vendor clients to help establish meaningful product positioning within an overcrowded marketplace, as well as with IT clients seeking to establish effective baselines for strategic management initiatives. He is a speaker on many management related issues. 

Prior to joining EMA, Dennis worked to develop marketing strategies and new business models for Cabletron’s SPECTRUM management software. He initiated a pilot program for a new software marketing organization based on a flexible, entrepreneurial dynamic. Dennis also coordinated a broad marketing effort to reposition SPECTRUM away from element management toward a robust SLM niche. Before Cabletron, Dennis spent 14 years with IBM in marketing and communications, including a year of international consulting on best practices for bringing networking solutions to market. 

At the occasion of today’s episode, we want to spend a bit of time on the digital war room and ask ouservles…

  • What the “digital war room” really is
  • What technologies Dennis foresees as shaping the digital war room most dramatically in the present/future?
  • Dennis has recently written a buyer’s guide on advanced IT analytics and we would like to know more about their potential impact
  • What we should expect as the impact of DevOps/ agile on the digital war room? What about the impact of cloud—and public cloud in particular?
  • What will the future be for the digital war room? Will there even be a war room?

Has your company turned you into a social engineering lab rat?

00:0000:00

880x440-episode13-arun-vishwanath.png

 

In this PICNIC episode, we welcome Arun Vishwanath to talk about The Psychology of Users Falling for Social Engineering Tactics.  The host is Greg Mooney.

Arun Vishwanath, Ph.D., MBA, is Associate Professor at the University at Buffalo and Faculty Associate at the Berkman Center for Internet and Society at Harvard University. 

Arun’s research focuses on the “people problems” of cyber security. His particular interest is in understanding why organizational insiders willingly exfiltrate sensitive organizational data, why people become unintentional insiders by falling prey to social engineering attacks, and on ways we can harness this understanding to secure cyber space 

His research has been presented at leading outlets from the Johns Hopkins Applied Physics Lab to the U.S. Army Cyber Institute at West Point and BlackHat.

Arun has authored more than two-dozen peer reviewed research papers on the science of cyber security and is a frequent CNN opinion contributor. His work has been cited in leading outlets from Scientific American to Wired Magazine

During today’s episode, we will discuss topics such as election hacking, social engineering and so much more.

Join us on Thursday November 9 at 3:00 pm ET!

PowerShell, what and why?

00:0000:00

880x440-episode12-adam-bertram.png

In Today’s PICNIC episode, our host Greg Mooney welcomes Adam Bertram and his guests Jeffrey Hicks and Michael Greene. We'll be having a discussion, in a roundtable format, on the "whats" and "whys" of this popular scripting language.

A little bit about our guests:

Adam Bertram is Chief Automator at Adam the Automator LLC. He is an automation engineer, blogger, independent consultant, freelance writer, author, trainer, and presenter. Adam focuses on DevOps, system management, and automation technologies as well as various cloud platforms. He is a Microsoft Cloud and Datacenter Management MVP, a passionate learner and efficiency nerd that enjoys teaching others a better way to leverage automation. You can find Adam at is adamtheautomator.com blog, LinkedIn or on Twitter at @adbertram.

Jeffery Hicks is an IT veteran with over 25 years of experience, much of it spent as an IT infrastructure consultant specializing in Microsoft server technologies with an emphasis in automation and efficiency. He is a multi-year recipient of the Microsoft MVP Award. He works today as an independent author, teacher and consultant. Jeff has taught and presented on PowerShell and the benefits of automation to IT Pros worldwide. Jeff has authored and co-authored a number of books, writes for numerous online sites and print publications, is a contributing editor at Petri.com, a Pluralsight author, and a frequent speaker at technology conferences and user groups.

Michael Greene is a Principal Program Manager at Microsoft and is lead program manager for the Desired State Configuration (DSC) product. Michael is also co-lead for Azure DSC, and community manager for Azure Security & Operations Management Services.

During today’s roundtable, our host and guests will cover questions every IT pro has:

  • Top three reasons to why someone would want to learn PowerShell
  • The biggest blocker that prevents more people from using PowerShell
  • The most rewarding story heard from an IT professional that had adopted PowerShell
  • Microsoft action plan to work with the community