Podcasts about infosystems

  • 4PODCASTS
  • 138EPISODES
  • 23mAVG DURATION
  • ?INFREQUENT EPISODES
  • Mar 31, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about infosystems

Latest podcast episodes about infosystems

Business and Technology in Tennessee with Josh Davis

In this episode of Cyber Ops Unmasked, InfoSystem's Keith Hales sits down with Mackenzie Brown from Blackpoint Cyber to discuss cyber security posture management and how business can best prepare themselves for the storm. How can you get your organization running the way it should? Where do you currently stand with cyber resilience? What do you need to do to get where you need to be? Learn more about the tools and strategies InfoSystems uses to provide realistic, holistic, and historically informed roadmaps for business leaders to know what to do and what steps to take to protect their businesses. Listen to the most recent episode of Cyber Ops Unmasked now. VISIT THE INFOSYSTEMS WEBSITE: https://infosystemsinc.com/ CHECK OUT INFOSYSTEMS CYBER: https://infosystemscyber.com INFOSYSTEMS ON LINKEDIN: https://www.linkedin.com/company/infosystems-inc-/ INFOSYSTEMS ON FACEBOOK: https://www.facebook.com/InfoSystems

preparing it security mackenzie brown infosystems
Enterprise Tech Spotlight with Keith Hales
How InfoSystems and Dell Technologies Provide Flexibility with APEX Flex on Demand

Enterprise Tech Spotlight with Keith Hales

Play Episode Listen Later Jan 24, 2024 16:12


In this episode of Enterprise Tech Spotlight, InfoSystems CEO Keith Hales sits down with John Murdoch from Dell Technologies to discuss APEX Flex on Demand, a service that provides enterprise businesses with a flexible and cost-effective approach to customizing hardware and software configurations. In the episode, Keith and John cover the benefits of Flex on Demand, including predictable payments, customizable technology, lower usage rates, and more. With InfoSystems and Dell, you can get the best possible results for your network architecture and overall IT strategy. Listen to the episode today to learn more! VISIT THE INFOSYSTEMS WEBSITE: https://infosystemsinc.com/ CHECK OUT INFOSYSTEMS CYBER: https://infosystemscyber.com INFOSYSTEMS ON LINKEDIN: https://www.linkedin.com/company/infosystems-inc-/  INFOSYSTEMS ON FACEBOOK: https://www.facebook.com/InfoSystems  

Enterprise Tech Spotlight with Keith Hales
Will AI Replace Humans? How Automation Can Boost Business Performance with Alex Feinberg from IBM

Enterprise Tech Spotlight with Keith Hales

Play Episode Listen Later Dec 4, 2023 12:12


Alex Feinberg, Principal of Learning Content Development for IBM Automation Software (Global), talked with us at the Artificial Intelligence Summit about how IBM Intelligent Automation delivers the most complete, AI-powered automation portfolio. Additionally, he talked about how AI won't replace humans, it will actually help us improve productivity and create customer-focused, agile, and efficient business practices. In our most recent podcast episode, Keith Hales shares some of Alex's interview footage and gets into the subject of AI for automation as a competitive edge for businesses. Listen to our latest episode today.  VISIT THE INFOSYSTEMS WEBSITE: https://infosystemsinc.com/ CHECK OUT INFOSYSTEMS CYBER: https://infosystemscyber.com INFOSYSTEMS ON LINKEDIN: https://www.linkedin.com/company/infosystems-inc- INFOSYSTEMS ON FACEBOOK: https://www.facebook.com/InfoSystems  

Enterprise Tech Spotlight with Keith Hales
Artificial Intelligence Threats: Predict, Prevent, and Respond with Mark Moore from IBM

Enterprise Tech Spotlight with Keith Hales

Play Episode Listen Later Dec 4, 2023 14:11


During the Artificial Intelligence Summit, Mark Moore, Principal Security Technology Advocate with IBM Technology, broke down IBM's zero-trust security strategy when it comes to security and AI. Mark dives into the benefits of AI, as well as the threats that come with it. In our most recent podcast episode, Keith Hales talks about the implications of what Mark shared in his talk, as well as conversations business leaders should be having surrounding this topic. Listen to our latest episode today.  VISIT THE INFOSYSTEMS WEBSITE: https://infosystemsinc.com/ CHECK OUT INFOSYSTEMS CYBER: https://infosystemscyber.com INFOSYSTEMS ON LINKEDIN: https://www.linkedin.com/company/infosystems-inc- INFOSYSTEMS ON FACEBOOK: https://www.facebook.com/InfoSystems

Enterprise Tech Spotlight with Keith Hales
AI and Sustainability: Meeting Goals and Regulations with Tom Limanek from IBM

Enterprise Tech Spotlight with Keith Hales

Play Episode Listen Later Dec 4, 2023 14:08


During the Artificial Intelligence Summit a couple weeks ago, Tom Limanek, B2B Integration and Supply Chain Enablement Principal at IBM, shared all about how IBM leverages the power of AI to help them operationalize their sustainability goals and meet regulatory requirements. In our most recent podcast episode, Keith Hales dives more into the topic of AI and sustainability, discussing how companies can use data and tracking tools to know where they stand when it comes to their sustainability goals. With all kinds of different use cases for AI, it's important to have the right tracking tools and strategies for reporting. Listen to our latest episode today. VISIT THE INFOSYSTEMS WEBSITE:  https://infosystemsinc.com/ CHECK OUT INFOSYSTEMS CYBER:  https://infosystemscyber.com  INFOSYSTEMS ON LINKEDIN:  https://www.linkedin.com/company/infosystems-inc-  INFOSYSTEMS ON FACEBOOK:  https://www.facebook.com/InfoSystems

Enterprise Tech Spotlight with Keith Hales
Increase Business Value with Artificial Intelligence: Data and AI with Alyssa Bergman from IBM

Enterprise Tech Spotlight with Keith Hales

Play Episode Listen Later Dec 1, 2023 12:02


A couple weeks ago at the Artificial Intelligence Summit, Alyssa Bergman shared with us real-world cases of clients who have increased their business value by leveraging AI to optimize data strategy, enabling data-driven decision-making. In this episode of Enterprise Tech Spotlight, Keith Hales shares an interview with Alyssa post-speech and dives into more of her talking points, including conversations business leaders should be having surrounding AI and how they can use it to improve the lives of their employees and team members. Listen to our latest episode today. VISIT THE INFOSYSTEMS WEBSITE: https://infosystemsinc.com/ CHECK OUT INFOSYSTEMS CYBER: https://infosystemscyber.com INFOSYSTEMS ON LINKEDIN: https://www.linkedin.com/company/infosystems-inc- INFOSYSTEMS ON FACEBOOK: https://www.facebook.com/InfoSystems

Enterprise Tech Spotlight with Keith Hales
Understanding Artificial Intelligence for Business with Paul Zikopoulos from IBM

Enterprise Tech Spotlight with Keith Hales

Play Episode Listen Later Nov 28, 2023 12:17


During the Artificial Intelligence Summit last week, Paul Zikopoulos from IBM shared his front-line experience in leveraging AI to help drive IBM further, faster. In this episode of Enterprise Tech Spotlight, Keith Hales, CEO of InfoSystems, shares an inside look into Paul's keynote speech, as well as some input on what AI developments mean for the industry. Listen to our latest episode today. VISIT THE INFOSYSTEMS WEBSITE:  https://infosystemsinc.com/ CHECK OUT INFOSYSTEMS CYBER:  https://infosystemscyber.com INFOSYSTEMS ON LINKEDIN: https://www.linkedin.com/company/infosystems-inc- INFOSYSTEMS ON FACEBOOK: https://www.facebook.com/InfoSystems  

Business and Technology in Tennessee with Josh Davis
What is a Cyber Resilience Analysis?

Business and Technology in Tennessee with Josh Davis

Play Episode Listen Later Oct 17, 2023 15:30


In this episode of Cyber Ops Unmasked, Keith Hales and Chris Bevil dive into the world of cyber resilience, asking questions that all business owners should be asking in order to move their business forward.  How can you get your organization running the way it should? Where do you currently stand with cyber resilience? What do you need to do to get where you need to be?  Learn more about the tools and strategies InfoSystems uses to provide realistic, holistic, and historically informed roadmaps for business leaders to know what to do and what steps to take to protect their businesses. 

cyber resilience infosystems
Enterprise Tech Spotlight with Keith Hales
How InfoSystems Can Provide Reliability and Scalability for Your Business with IBM Power Systems

Enterprise Tech Spotlight with Keith Hales

Play Episode Listen Later Oct 3, 2023 13:39


IBM Power Systems have proven themselves in a wide range of applications, from analytics and AI to databases like Oracle and DB2, as well as backup and recovery.   One of the standout applications is SAP HANA, which thrives on IBM Power Systems' robust architecture.   In this most recent episode of Enterprise Tech Spotlight, Keith Hales, John Von Mann, and Ben Lucas discuss the reliability and scalability IBM Power Systems, as well as how clients can partner with InfoSystems to provide the solutions you need for your business.  Listen to the most recent episode of Enterprise Tech Spotlight now.  VISIT THE INFOSYSTEMS WEBSITE: https://infosystemsinc.com/   CHECK OUT INFOSYSTEMS CYBER:  https://infosystemscyber.com   INFOSYSTEMS ON LINKEDIN:  https://www.linkedin.com/company/infosystems-inc-   INFOSYSTEMS ON FACEBOOK:  https://www.facebook.com/InfoSystems   

Business and Technology in Tennessee with Josh Davis
What is the Difference Between Cybersecurity and Cyber Compliance?

Business and Technology in Tennessee with Josh Davis

Play Episode Listen Later Sep 18, 2023 12:05


In this episode of Cyber Ops Unmasked, Keith Hales, CEO of InfoSystems, and Chris Bevil, CISO at InfoSystems, dive into the intricate relationship between cybersecurity and compliance. They explore common misconceptions surrounding these two aspects of security and highlight why each should be treated as a separate entity. Additionally, Chris Bevil provides valuable insights on how organizations can navigate the complexities of compliance and what to look for to determine their compliance obligations. Listen to the most recent episode of Cyber Ops Unmasked now. VISIT THE INFOSYSTEMS WEBSITE: https://infosystemsinc.com/   CHECK OUT INFOSYSTEMS CYBER: https://infosystemscyber.com    INFOSYSTEMS ON LINKEDIN: https://www.linkedin.com/company/infosystems-inc-   INFOSYSTEMS ON FACEBOOK: https://www.facebook.com/InfoSystems

Enterprise Tech Spotlight with Keith Hales
Unveiling the Future of SAP HANA with IBM Power Systems

Enterprise Tech Spotlight with Keith Hales

Play Episode Listen Later Sep 4, 2023 19:36


Is SAP HANA the right fit for your business? In this episode of Enterprise Tech Spotlight, Keith Hales is joined by Bharvi Parikh and Paul McCann from IBM to talk about SAP HANA, a multi-model database that stores data in its memory instead of keeping it on a disk.   Keith, Bharvi, and Paul explore IBM Power solutions, differentiators between what IBM offers and other companies, and share some real-world examples of companies that currently run their SAP environment on IBM solutions.  Listen to the most recent episode of Enterprise Tech Spotlight now.  VISIT THE INFOSYSTEMS WEBSITE:  https://infosystemsinc.com/  CHECK OUT INFOSYSTEMS CYBER:  https://infosystemscyber.com  INFOSYSTEMS ON LINKEDIN:  https://www.linkedin.com/company/infosystems-inc-  INFOSYSTEMS ON FACEBOOK:  https://www.facebook.com/InfoSystems

Business and Technology in Tennessee with Josh Davis
Cybersecurity Best Practices for Data Backup and Recovery

Business and Technology in Tennessee with Josh Davis

Play Episode Listen Later Aug 21, 2023 14:09


Is your data backed up and safe from the bad guys? In this episode of Cyber Ops Unmasked, Keith Hales and Robert Goodwin from InfoSystems explore best practices when it comes to the complexities of data backup and recovery. It's not enough to store your data somewhere and pull it out when you need it anymore. You must implement effective measures and systems to safeguard your digital assets. Listen to this episode to learn more about what immutable copies of your data are, how you can keep your data safe from the bad guys, and why it is absolutely necessary to test your backups. VISIT THE INFOSYSTEMS WEBSITE: https://infosystemsinc.com/ INFOSYSTEMS ON LINKEDIN: https://www.linkedin.com/company/infosystems-inc- INFOSYSTEMS ON FACEBOOK: https://www.facebook.com/InfoSystems

Enterprise Tech Spotlight with Keith Hales
How Businesses Can Approach Modern IT Infrastructure Strategies - Part 1

Enterprise Tech Spotlight with Keith Hales

Play Episode Listen Later Aug 14, 2023 18:05


When it comes to your approach to modern IT infrastructure, it's important to think about all the different systems there are and how the world has changed over the years when it comes to technology.  Businesses can use a hyper-converged system, cloud system, or opt for a hybrid approach where they're using using multiple systems and making all of them work together. In part one of this episode of Enterprise Tech Spotlight, Keith Hales and Robert Goodwin from InfoSystems break down each of these systems. They explore the different components of each system, cost differences, pros and cons, and more.  Listen now to take a deep dive into each of these important systems. VISIT THE INFOSYSTEMS WEBSITE: https://infosystemsinc.com/ INFOSYSTEMS ON LINKEDIN: https://www.linkedin.com/company/infosystems-inc- INFOSYSTEMS ON FACEBOOK: https://www.facebook.com/InfoSystems  

Enterprise Tech Spotlight with Keith Hales
How Businesses Can Approach Modern IT Infrastructure Strategies - Part 2

Enterprise Tech Spotlight with Keith Hales

Play Episode Listen Later Aug 14, 2023 18:59


In part one of our episode on how businesses can approach modern IT infrastructure strategies, Keith Hales and Robert Goodwin from InfoSystems dove into hyper-converged systems, cloud systems, and hybrid systems. They broke down the pros and cons and components of each system. In part two of this episode of Enterprise Tech Spotlight, Keith and Robert take a look at these systems from a business perspective rather than an IT perspective, getting into the cost acquisition of each, as well as how you can judge whether it will meet the needs of your business. Whether you have questions about month-to-month cost or just want to learn about cloud and hyper-converged infrastructure, this is the episode for you! VISIT THE INFOSYSTEMS WEBSITE: https://infosystemsinc.com/ INFOSYSTEMS ON LINKEDIN: https://www.linkedin.com/company/infosystems-inc- INFOSYSTEMS ON FACEBOOK: https://www.facebook.com/InfoSystems

Business and Technology in Tennessee with Josh Davis
How and Why to Set Cybersecurity Standards and Frameworks in Your Business

Business and Technology in Tennessee with Josh Davis

Play Episode Listen Later Aug 10, 2023 12:46


As cyber threats continue to evolve, it becomes essential for companies to establish effective standards to protect their data and ensure the security of their operations. Recently, we relaunched our podcast, Cyber Ops Unmasked, where we cover all things cybersecurity. Cybersecurity initiatives are often misunderstood, mismanaged, or purposely hidden in companies to avoid scrutiny. In this podcast, we'll have an open discussion so that cybersecurity operations are understood, managed effectively, and open to questioning and scrutiny. To learn more about InfoSystems Cyber, visit https://infosystemscyber.com/.

Enterprise Tech Spotlight with Keith Hales
Enterprise Tech Spotlight - Season 2, Episode 12

Enterprise Tech Spotlight with Keith Hales

Play Episode Listen Later Jan 4, 2021 14:43


Automation is a hot topic in the world of digital transformation and modernization, and for good reason. Many companies are beginning to understand that automating IT processes leads to increased productivity, reduced costs and a stronger capacity to manage IT environments overall.

IT Coach for Business Leaders with Aaron Swann
IT Coach for Growing Businesses - Season 2, Episode 15

IT Coach for Business Leaders with Aaron Swann

Play Episode Listen Later Dec 23, 2020 15:48


If one of your goals in 2021 is to harness the power of IT process automation, our partners at Red Hat have some good news: Ansible, an open source community project that is simple to use, reliable, and one of the fastest ways to automate IT, is making waves and transforming how businesses accomplish more.

Business and Technology in Tennessee with Josh Davis
Cybersecurity in Session - Season 1, Episode 39

Business and Technology in Tennessee with Josh Davis

Play Episode Listen Later Dec 9, 2020 14:08


Here’s a fact: the data you store and transmit across your organization’s networks is a highly valuable asset that needs to be protected. The size of your business is irrelevant; the industry you work in is also irrelevant. What matters to cybercriminals is if they can compromise your data and how much you will pay for its safe return.

IT Coach for Business Leaders with Aaron Swann
IT Coach for Growing Businesses - Season 2, Episode 14

IT Coach for Business Leaders with Aaron Swann

Play Episode Listen Later Dec 1, 2020 25:18


Think phishing scams don’t pose a real threat to your business? Think again. In this conversation of IT Coach for Growing Businesses, InfoSystems’ vCIO, Aaron Swann, discusses the various ways malware can access an organization’s network through email phishing scams. The conversation provides concrete steps businesses can follow to prevent malware from entering networks and spreading to devices and servers.

Enterprise Tech Spotlight with Keith Hales
Enterprise Tech Spotlight - Season 2, Episode 11

Enterprise Tech Spotlight with Keith Hales

Play Episode Listen Later Nov 10, 2020 15:56


Join us for a one on one chat with Cobalt Iron. Keith and Doug discuss the basics of backing up your information, the different models of Backups, and those that would benefit from backup conversations today. Tune in to learn more.

Business and Technology in Tennessee with Josh Davis
Cybersecurity in Session - Season 1, Episode 38

Business and Technology in Tennessee with Josh Davis

Play Episode Listen Later Nov 2, 2020 14:54


Are you a cyberattack enabler due to apathy or lack of understanding of what is happening within the Internet universe? In this episode, Fred and Garrett discuss why the “it cannot happen to me” approach to cybersecurity is fostering the growth of cybercrime and other threats delivered to your organization, courtesy of your Internet habits. 

IT Coach for Business Leaders with Aaron Swann
IT Coach for Small Business Leaders - Season 2, Episode 13

IT Coach for Business Leaders with Aaron Swann

Play Episode Listen Later Oct 21, 2020 30:18


In this episode, Aaron and Fred discuss value-adds that vCISOs can deliver to organizations. From learning how to create and follow a secure password policy to the most critical security needs, learn how to address common cybersecurity concerns from our vCISO.

Enterprise Tech Spotlight with Keith Hales
Enterprise Tech Spotlight - Season 2, Episode 10

Enterprise Tech Spotlight with Keith Hales

Play Episode Listen Later Oct 16, 2020 14:45


In this episode, Keith and Chris discuss how Red Hat and OpenShift are finally bringing the promise of the cloud to you, the customers. Over the years, there has been confusion about cloud. What does it do? What does it offer? What is it? And as the times change, so do the answers to these questions. Tune in to learn more.

IT Coach for Business Leaders with Aaron Swann
IT Coach for Small Business Leaders - Season 2, Episode 12

IT Coach for Business Leaders with Aaron Swann

Play Episode Listen Later Sep 23, 2020 22:13


In this episode, Aaron and Danika discuss a question from a listener - "How do I protect my company's wireless network in a high traffic area?" Many companies are surrounded or nearby busy streets, other businesses, and housing. This means your wireless network is being seen hundreds of times each day by complete strangers. Whether you are headquartered in a large city like Charlotte, NC or a small town in Georgia, your company should take precautions to keep your wireless network safe.

Enterprise Tech Spotlight with Keith Hales
Enterprise Tech Spotlight - Season 2, Episode 9

Enterprise Tech Spotlight with Keith Hales

Play Episode Listen Later Sep 9, 2020 19:29


In this episode, Keith and Andrew discuss this little-known fact: IBM is more accessible than we thought. Over the years, IBM has recognized that they've missed an opportunity to provide high end solutions to smaller businesses. So, people like Andrew are joining IBM to raise awareness and bring the same solutions enterprise level organizations are getting to small businesses at prices they can afford.

Business and Technology in Tennessee with Josh Davis
Cybersecurity Weekly - Season 1, Episode 36

Business and Technology in Tennessee with Josh Davis

Play Episode Listen Later Sep 8, 2020 18:18


In this episode, Fred and Garrett discuss the last CIS Control, Penetration Tests and Red Team Exercises. This control focuses on testing the security measures already in place within your organization. Penetration Tests and Red Team Exercises are most impactful when a company has taken action against the first 19 CIS Controls (following the CIS Top 20 Cybersecurity Controls).

Business and Technology in Tennessee with Josh Davis
Cybersecurity Weekly - Season 1, Episode 35

Business and Technology in Tennessee with Josh Davis

Play Episode Listen Later Aug 31, 2020 15:19


In this episode, Fred and Garrett discuss the third Organizational CIS Control, Incident Response and Management. This control focuses on creating an incident response plan to protect your organization's information and reputation. Incident Response and Management is most impactful when a company has taken action against the first 18 CIS Controls (following the CIS Top 20 Cybersecurity Controls).

Business and Technology in Tennessee with Josh Davis
Cybersecurity Weekly - Season 1, Episode 34

Business and Technology in Tennessee with Josh Davis

Play Episode Listen Later Aug 24, 2020 24:12


In this episode, Fred and Garrett discuss the second Organizational CIS Control, Application Software Security. This control is used to manage the security life cycle of your software. This control is used to prevent, detect, and correct security weaknesses. Application Software Security is most impactful when a company has taken action against the first 16 CIS Controls (following the CIS Top 20 Cybersecurity Controls).

Business and Technology in Tennessee with Josh Davis
Cybersecurity Weekly - Season 1, Episode 33

Business and Technology in Tennessee with Josh Davis

Play Episode Listen Later Aug 17, 2020 18:47


In this episode, Fred and Rob discuss the first Organizational CIS Control, Implement a Security Awareness and Training Program. This control is used to develop and execute a plan for a security awareness and training program. This control is useful for those at all levels of an organization. Implementing a Security Awareness and Training Program is most impactful when a company has taken action against the first 16 CIS Controls (following the CIS Top 20 Cybersecurity Controls).

Business and Technology in Tennessee with Josh Davis
Cybersecurity Weekly - Season 1, Episode 32

Business and Technology in Tennessee with Josh Davis

Play Episode Listen Later Aug 10, 2020 14:06


In this episode, Fred and Rob discuss the tenth Foundational CIS Control, Account Monitoring and Control. This control is used to actively manage and control user accounts-such as that of employees or contractors-from creation to deletion. Account Monitoring and Control is most impactful when a company has taken action against the first 15 CIS Controls (following the CIS Top 20 Cybersecurity Controls).

Business and Technology in Tennessee with Josh Davis
Cybersecurity Weekly - Season 1, Episode 31

Business and Technology in Tennessee with Josh Davis

Play Episode Listen Later Aug 6, 2020 15:30


In this episode, Fred and Tim discuss the ninth Foundational CIS Control, Wireless Access Control. This control is used to track, control, prevent, and correct the way you use your wireless local area networks, access points, and wireless client systems. Wireless Access Control is most impactful when a company has taken action against the first 14 CIS Controls (following the CIS Top 20 Cybersecurity Controls).

Business and Technology in Tennessee with Josh Davis
Cybersecurity Weekly - Season 1, Episode 30

Business and Technology in Tennessee with Josh Davis

Play Episode Listen Later Jul 27, 2020 18:28


In this episode, Fred and Rob discuss the eighth Foundational CIS Control, Controlled Access Based on the Need to Know. This control is used to track, control, prevent, and correct secure access to sensitive systems and data. Controlled Access Based on the Need to Know is most impactful when a company has taken action against the first 13 CIS Controls (following the CIS Top 20 Cybersecurity Controls).

Business and Technology in Tennessee with Josh Davis
Cybersecurity Weekly - Season 1, Episode 29

Business and Technology in Tennessee with Josh Davis

Play Episode Listen Later Jul 20, 2020 16:12


In this episode, Fred and Tim discuss how you can protect your data. Data protection is the seventh Foundational CIS Control and is used to prevent your data from being exploited, lessen the effects if it is exploited, and ensure your sensitive information is kept intact. Data Protection is most impactful when a company has taken action against the first twelve CIS Controls (following the CIS Top 20 Cybersecurity Controls).

Business and Technology in Tennessee with Josh Davis
Cybersecurity Weekly - Season 1, Episode 28

Business and Technology in Tennessee with Josh Davis

Play Episode Listen Later Jul 13, 2020 13:23


In this episode, Fred and Tim discuss how you can detect, prevent, and correct the way your information is shared between networks. This is the sixth Foundational CIS Control and is used to secure your network perimeter. Boundary Defense is most impactful when a company has taken action against the first eleven CIS Controls (following the CIS Top 20 Cybersecurity Controls).

Business and Technology in Tennessee with Josh Davis
Cybersecurity Weekly - Season 1, Episode 27

Business and Technology in Tennessee with Josh Davis

Play Episode Listen Later Jul 7, 2020 13:03


In this episode, Fred and Rob discuss how you can secure network devices. This is the fourth Foundational CIS Control and is used to secure the configuration for network devices such as Firewalls, Routers, and Switches. Secure configuration for network devices is most impactful when a company has taken action against the first ten CIS Controls (following the CIS Top 20 Cybersecurity Controls).

Business and Technology in Tennessee with Josh Davis
Cybersecurity Weekly - Season 1, Episode 26

Business and Technology in Tennessee with Josh Davis

Play Episode Listen Later Jun 29, 2020 13:55


In this episode, Fred and Rob discuss Data Recovery Capability, the processes and tools used to back up your data. This is the fourth Foundational CIS Control and focuses on backing up and recovering your data as quickly as possible. Data Recovery Capability is most impactful when a company has taken action against the first nine CIS Controls (following the CIS Top 20 Cybersecurity Controls).

Business and Technology in Tennessee with Josh Davis
Cybersecurity Weekly - Season 1, Episode 25

Business and Technology in Tennessee with Josh Davis

Play Episode Listen Later Jun 22, 2020 18:24


In this episode, Fred and Garrett discuss how you can manage ports, protocols, and services on devices connected to your company's network. This control focuses on minimizing your vulnerability to cyber-attackers. This is the third Foundational CIS Control and is used to minimize your vulnerability to attackers. The Limitation and Control of Network Ports, Protocols, and Services control is most impactful when a company has taken action against the first six Basic CIS Controls and first two Foundational CIS Controls (following the CIS Top 20 Cybersecurity Controls).

Business and Technology in Tennessee with Josh Davis
Cybersecurity Weekly - Season 1, Episode 24

Business and Technology in Tennessee with Josh Davis

Play Episode Listen Later Jun 15, 2020 16:37


In this episode, Fred and Garrett discuss how you can adopt defenses to deflect Malicious Software (AKA Malware). This is the second Foundational CIS Control and is crucial for your personal and business security. The Malware Defenses control is most impactful when a company has taken action against the first six Basic CIS Controls and the first Foundational CIS Control (following the CIS Top 20 Cybersecurity Controls).

Business and Technology in Tennessee with Josh Davis
Cybersecurity Weekly - Season 1, Episode 23

Business and Technology in Tennessee with Josh Davis

Play Episode Listen Later Jun 8, 2020 11:37


In this episode, Fred and Garrett discuss the recent Mozilla Firefox Vulnerability Patches that were issued. These vulnerabilities have been found to allow cyber criminals to install programs, manipulate data, and create new accounts with full user rights under your account(s). Anyone currently using Mozilla Firefox versions prior to 77.0 should take immediate action.

Enterprise Tech Spotlight with Keith Hales
Enterprise Tech Spotlight - Season 2, Episode 8

Enterprise Tech Spotlight with Keith Hales

Play Episode Listen Later Jun 2, 2020 17:15


In this episode, Keith and Robert discuss a "security minded" approach to the new work experience many companies are facing. As we transition from quarantine amidst the Covid-19 pandemic, many companies are faced with questions. And after a long period of working from home, many will find themselves needing to adopt a new approach to security.

Business and Technology in Tennessee with Josh Davis
Cybersecurity Weekly - Season 1, Episode 22

Business and Technology in Tennessee with Josh Davis

Play Episode Listen Later Jun 1, 2020 21:22


In this episode, Fred and Rob discuss how you can protect your email and web browsers. This is the first Foundational CIS Control and is used to minimize your vulnerability to attackers. The Email and Web Browser Protections control is most impactful when a company has taken action against the first six Basic CIS Controls (following the CIS Top 20 Cybersecurity Controls).

Business and Technology in Tennessee with Josh Davis
Cybersecurity Weekly - Season 1, Episode 21

Business and Technology in Tennessee with Josh Davis

Play Episode Listen Later May 27, 2020 13:52


In this episode, Fred and Rob discuss how to collect, manage, and analyze audit logs that help a corporation detect, understand, and recover from a cyber-attack. The maintenance, monitoring, and analysis of audit logs is most impactful when a company first has taken an inventory of Hardware Assets and Software Assets, practices Continuous Vulnerability Management, has Controlled Use of Administrative Privileges, and has Secured Configuration of Hardware/Software (following the CIS Top 20 Cybersecurity Controls).

Business and Technology in Tennessee with Josh Davis
Cybersecurity Weekly - Season 1, Episode 20

Business and Technology in Tennessee with Josh Davis

Play Episode Listen Later May 18, 2020 15:51


In this episode, Fred and Rob discuss part two of becoming a Cybersecurity professional. Previously, Fred and Rob discussed being on the "offense" in the Cybersecurity industry. Now they'll discuss being on the "defense" and what that side of Cybersecurity looks like. Because the Cybersecurity field is ever changing, there is a great need for these experts and their unique skill set. The industry is booming and new opportunities are arising every day.

Business and Technology in Tennessee with Josh Davis
Cybersecurity Weekly - Season 1, Episode 19

Business and Technology in Tennessee with Josh Davis

Play Episode Listen Later May 11, 2020 15:55


In this episode, Fred and Rob discuss how to establish, implement, and manage security arrangements of hardware and software on devices. This helps prevent cyber attackers from getting control of vulnerable settings and services. The secure configuration for hardware and software is most impactful when a company first has taken an inventory of Hardware Assets and Software Assets, practices Continuous Vulnerability Management, and has Controlled Use of Administrative Privileges (following the CIS Top 20 Cybersecurity Controls).

Business and Technology in Tennessee with Josh Davis
Cybersecurity Weekly - Season 1, Episode 18

Business and Technology in Tennessee with Josh Davis

Play Episode Listen Later May 4, 2020 19:28


In this episode, Fred and Rob discuss professional roles in the Cybersecurity industry and why you should consider it. Not only are Cybersecurity experts the most sought after professionals in the technology industry, but because the Cybersecurity field is ever changing, there is a great need for these experts and their unique skill set. The industry is booming with no end in sight. And new opportunities are arising every day.

IT Coach for Business Leaders with Aaron Swann
IT Coach for Small Business Leaders - Season 2, Episode 11

IT Coach for Business Leaders with Aaron Swann

Play Episode Listen Later May 1, 2020 36:13


In this episode, Aaron and Josh discuss a question from a listener - "How do I select a good home router?" A router is what sits between you and the internet. Selecting the right home router depends on factors like the size of your home and your internet speed. While this podcast was made for small business leaders, we strive to answer questions that help listeners stay connected, safe, and secure no matter where they are. This is especially true with many working remotely right now.

Enterprise Tech Spotlight with Keith Hales
Enterprise Tech Spotlight - Season 2, Episode 7

Enterprise Tech Spotlight with Keith Hales

Play Episode Listen Later May 1, 2020 13:57


In this episode, Keith and Robert discuss approaching work-from-home with security in mind. Many employees have recently been sent to work from home. This change has highlighted company security needs. Employees have taken corporate laptops home to unsecure networks and some have been using their own personal laptops to perform important tasks. With many corporate networks designed to have everybody working from the office, companies have been caught off guard.

Business and Technology in Tennessee with Josh Davis
Cybersecurity Weekly - Season 1, Episode 17

Business and Technology in Tennessee with Josh Davis

Play Episode Listen Later Apr 27, 2020 15:04


In this episode, Fred and Rob discuss controlling the use of administrative privileges, the process of managing privileges on computers, networks, and applications. The controlled use of administrative privileges is most impactful when a company first has taken an inventory of Hardware Assets and Software Assets, and practices Continuous Vulnerability Management (following the CIS Top 20 Cybersecurity Controls).

Business and Technology in Tennessee with Josh Davis
Cybersecurity Weekly - Season 1, Episode 16

Business and Technology in Tennessee with Josh Davis

Play Episode Listen Later Apr 15, 2020 21:56


Setting up a remote workforce is frustrating when there are no policies or plans in place to help. In addition, without the proper security measures, a remote workforce is vulnerable to cyber-attack. In this episode, Fred and Josh discuss how to respond to the demand of a remote workforce with proactive policies, plans, and security controls. This episode is not meant to be a quick fix or legal advice, but tried and true advice from InfoSystems' lead Cybersecurity expert, Fred Cobb. First, all business leaders should take a look at the administrative controls that are in place to cover remote workers and their technology.

IT Coach for Business Leaders with Aaron Swann
IT Coach for Small Business Leaders - Season 2, Episode 10

IT Coach for Business Leaders with Aaron Swann

Play Episode Listen Later Apr 15, 2020 22:57


In this episode, Aaron and Josh discuss how to choose a computer. Choosing a new computer for your specific needs is never an easy task. Not to mention, it's time consuming. Much like buying a car, you have an abundance of styles, sizes, and speeds available at your fingertips - but choose too quickly and you'll miss important info like safety and model ratings.