This interview was a lot of fun.
Enterprises frequently buy security products with the best of intentions, but they end up being abandoned. Sometimes the product never makes it out of the box and into the rack. What factors contribute towards security shelfware and what can be done by both vendors and enterprises to avoid this happening? If it has happened how can you reverse it?What are the top security products that end up on the shelf or marginally used?
In this interview with Thycotic software’s CEO Jonathan Cogley it would be easy to have our discussion based solely on the success of his product and company. Thycotic has been on a tear dominating the password management space. What you will get from this interview is something of deeper value. We discuss Jonathan’s focus on Thycotic’s Unique Culture, Risk based CIO decision making, and key aspects of you network that you want to absolutely be in control of.
My discussion with Jean Gomes, Chairman of the Energy Project is a fascinating one.
Jean works with some of the largest IT companies in the world like Google and Yahoo as well as Sony and other brands. We discuss how he teaches leaders of companies to build their latent capacities in today’s accelerating world. I am a huge believer in tapping our reserves of potentialThis show will change your perception on what you are capable of. This is not an episode about how to push the wheel faster or keep more plates spinning. The role of a leader today demands that we tap all of our reserves and capabilities so that we can pull off the good that we were destined to create.
Our discussion is not about chasing how efficiently you can mow the lawn or plow the field. Today you need to have the mental agility to use the part of the brain that synthesizes and correlates, draws distinctions and unique relationships between things. You can’t do this if you are exhausted or depressed. We review cutting edge research on the topics of health, wellness, and neuroscience as it relates to optimal performance.
In this episode with Davi Ottenheimer you are going to love learning more about Big Data Security and the challenges that CIOs face as well as the planet. The challenges that the IT profession and IT Security face are tough ones.
We dive into many concepts related to why you can’t limit gathering data and at the same time expect to find security correlations between system systems or people. You will learn why De-Identification so important to understand with Big Data Security? And why it doesn’t work!
Data Governance from core to edge. Smart alerting, file permissions, active directory, and other technical areas in IT Security monitoring with Big Data Security Analytics, HIPPA, and PCI. Reducing noise and getting to what matters for core IT security events with tools from Varonis.
Bob Fecteau is a Tier 1 CIO with SAIC. This episode reviews leadership vs management, being a financial expert, examples of owning problems, building CIOs, the skills needed to be a next gen CIO
Chuck Blakeman has built 8 businesses on 4 continents. He is the CEO of Crankset Group which helps businesses move from an Industrial Age to a Participation Age Company. In this episode you will learn how to move from an employee mentality to a stakeholder mindset and many other concepts for leaders and entrepreneurs.