Podcasts about inspired elearning

  • 3PODCASTS
  • 8EPISODES
  • 33mAVG DURATION
  • ?INFREQUENT EPISODES
  • Jul 21, 2021LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about inspired elearning

Latest podcast episodes about inspired elearning

Tales From The PROS
What It Takes For A Company To Become SaaS Industry Leader

Tales From The PROS

Play Episode Listen Later Jul 21, 2021 52:19


In today's episode of Tales from the PROS, I talk with Mike Welsh, who is a veteran leader in sales and revenue growth and has been named CEO of Uptime.com, a leader in website monitoring software He brings more than two decades of sales and revenue leadership experience to Uptime.com, driving growth for numerous public and private software-as-a-service (SaaS) companies, such as Chargify, Rackspace Cloud, and Inspired eLearning.  In this episode, we talk about Mike's journey to entrepreneurship, his experience of building and growing a SaaS business, overcoming the challenges of running a SaaS company, the future of websites, and how to be a strong leader.   Don't Miss: 1. Mike's advice to handling the role of CEO the right way - 06:30 2. What are the challenges that SaaS companies encounter - 25:13 3. How to execute your website's performance check the right way - 36:41   Listen and Subscribe on iTunes: https://podcasts.apple.com/us/podcast/tales-from-the-pros/id1371067192   Topics We Discuss: 1. Mike's inspiring story of how he got to where he is today 2. What it takes to be a CEO of a growing and thriving company 3. What it takes for a company to be an industry SaaS leader like Uptime 4. The biggest hurdles/problems that SaaS companies have and how to overcome them 5. Mike talks about some of the major problems that website's face today and how to overcome them 6. The future of website monitoring and performance 7. Thoughts and advice on how to be a strong business leader 8. Mike defines his story in "one-word"   Follow Mike Welsh Website: https://uptime.com/ Linkedin: https://www.linkedin.com/in/miwelsh/ Twitter: https://twitter.com/UptimeDotCom   Follow Me and Subscribe: https://linktr.ee/mgeorgiou22

Cybercrime Magazine Podcast
Inspired eLearning and Dr. Jay, Deputy CISO at MasterCard on Security Awareness Training

Cybercrime Magazine Podcast

Play Episode Listen Later Dec 6, 2019 25:26


Sponsored by: https://inspiredelearning.com For more on cybersecurity, visit us at https://cybersecurityventures.com/ Follow Cybersecurity Ventures / Cybercrime Magazine here: LinkedIn: https://linkedin.com/company/cybercri... Twitter: https://twitter.com/CybersecuritySF SoundCloud: https://soundcloud.com/cybercrimemaga... Instagram: https://instagram.com/cybercrimemagaz... Apple Podcasts: Cybercrime Magazine Podcast

Cybercrime Magazine Podcast
Inspired eLearning CEO & Frank Zinghini, CEO at Applied Visions Inc. on Security Awareness Training

Cybercrime Magazine Podcast

Play Episode Listen Later Aug 29, 2019 51:14


Frank Zinghini, CEO at Applied Visions Inc. (AVI) and Kyle Metcalf, CEO at Inspired eLearning discuss the importance of security awareness training for small businesses, and specifically how training employees can help an organization defend itself against phishing scams and potential ransomware attacks. For more on cybersecurity, visit us at https://cybersecurityventures.com/ Follow Cybersecurity Ventures / Cybercrime Magazine here: LinkedIn: https://linkedin.com/company/cybercrime-magazine/ Twitter: https://twitter.com/CybersecuritySF SoundCloud: https://soundcloud.com/cybercrimemagazine Instagram: https://instagram.com/cybercrimemagazine/ Apple Podcasts: Cybercrime Magazine Podcast

Cybercrime Magazine Podcast
Inspired eLearning CEO and Paul Caulfield, Chief Risk Officer at IDB on Security Awareness Training

Cybercrime Magazine Podcast

Play Episode Listen Later Jul 16, 2019 31:44


Paul Caulfield, Chief Risk Officer at Israel Discount Bank, and Kyle Metcalf, CEO of Inspired eLearning, discuss the importance of security awareness training for global financial institutions. Watch the interview to learn about how these two top cybersecurity professionals empower their employees and make security everybody's job. Read more: https://cybersecurityventures.com/cyber-intrusions-replace-bank-robberies-trillions-of-dollars-at-risk/ Sponsored by: https://inspiredelearning.com

Cybercrime Magazine Podcast
Inspired eLearning and Northwell Health on Security Awareness Training

Cybercrime Magazine Podcast

Play Episode Listen Later May 20, 2019 29:12


Three top cybersecurity professionals talk security training at Northwell Health. With 68,000 employees and 200,000 endpoint devices, they have developed a unique method to ensure that their data stays safe and secure. Sponsored by https://inspiredelearning.com/

Converge TechTalk
How to Think About Security Awareness for Your Organization

Converge TechTalk

Play Episode Listen Later May 8, 2019 29:02


Today’s guest for Converge TechTalkis Kyle Metcalf, CEO of Inspired eLearning, a security awareness and HR compliance training firm. Kyle spent 12 years at Rackspace before taking the help as CEO at Inspired eLearning, and is focused on helping the company become a leader in the highly competitive and growing market of cybersecurity training. Why cybersecurity training? Internet security is perhaps the biggest threat businesses of all sizes face today. Employees play a significant role when it comes to protecting against cyberattacks, as they are, quite literally, on the front lines of defense. Keeping them aware and knowledgeable about security risks and trained on protecting themselves and the company is business mission critical today. Our discussion centered on the following touchpoints— - Trends in security that make security awareness and training important. - Why you board needs to be involved in and committed to security. - What does a robust security awareness program look like? - How to justify budget for security awareness. - How to drive knowledge retention within your organization.

Converge TechTalk
2019 Cybersecurity Trend Review

Converge TechTalk

Play Episode Listen Later Jan 24, 2019 24:51


Mison Riggins from Inspired eLearning joins me for Converge Tech Talk today and we’re taking a look at the 2019 Cybersecurity trends and what we see as important now and in the coming months. We start off by addressing the Collection #1 Data Breach. With some 770+ million email records and 21 million passwords reported to be shared online, there’s every reason that it’s being called “the mother of all data breaches.” If you’d like to learn more about the Collection #1 breach, I’ve covered it here—Collection #1 Data Breach, What You Need to Know. Then we moved on to 2019 cybersecurity trends and what’s on the horizon. This includes: AI and Machine Learning AI and machine learning are current industry buzzwords, but Mison and I talk about how these things, or either of them, like weaponized AI, impact cybersecurity. Ransomware What’s happening with ransomware? Are we going to see more ransomware or less in 2019 and beyond? While we most likely expect to continue to hear about pointed attacks against big name companies and/or conglomerates, we’ll likely see a shift in cybercriminal focus to cryptocurrencies. The reason for the decline is that it is much more lucrative to mine cryptocurrencies through nefarious means than to steal protected data and hold it for a ransom payment that may or may not come. What should companies be doing to protect against ransomware? That said, it doesn’t mean you don’t still need to protect against ransomware. That means backing up your data and using encryption to protect your hard drives or at least your personally identifiable information (PII) as well as your intellectual property is still good security practice. Weaponized IoT We move on to the IoT … specifically, Weaponized IoT and the impact that has on the security space. So what is “Weaponized IoT”? Great question— and you’ve got to watch or listen to the interview for a deeper dive on this. Bottom line, more IoT connected devices means more opportunities for cybercriminals to take advantage of them for their own uses. What risks do Weaponized IoT attacks present, and who is their most likely target audience? The targets for weaponized IoT attacks include the relatively mundane, We expect to see escalated attacks specifically targeting critical industrial infrastructures like power plants, electricity grids, public utility services, and communication networks. Industrial IoT make a great target since their vulnerabilities lie in the underlying cloud infrastructure, increasing network connectivity to edge computing, difficulty in securing the devices themselves with Meltdown and Spectre vulnerabilities still in the mix, and the exponential number of devices that have to connect to the cloud for updates and maintenance. IIoT has become low-hanging fruit for attackers since just a compromise of back-end servers will cause widespread service outages and bring vital systems to a screeching halt, affecting other vital sectors at the same time. What Role do Privacy Regulations Play in Trend Predictions We expect consumer awareness of and demands for privacy protection to continue. As a result, we also expect cybersecurity trends to demonstrate increased legislative and regulatory activity continuing throughout 2019. GDPR violations will mostly likely start to receive penalties from 2019. We saw that with recent news of France levying a nearly $57m US fine against Google for GDPR violations, and that’s likely not the first such assessment. Also, state-level privacy regulations will continue to be outlined and distributed as we see happening in California already. Authentication Methods Will Improve There’s good news in cybersecurity trends for 2019 as it relates to authentication methods—passwords are going to get a massive makeover. Single Factor Passwords will be a thing of the past, perhaps even regulated as Dark Age Relics. With Fido Alliance and other such cross-organizational movements, the use of crypto keys instead of a single, albeit complex, password will be the more secure option to opening applications. Multi-factor authentication is already gaining ground with requests for “something you know”—a phrase or pin, and “something you have”—biometrics, token, or an encryption key, being the new norm. NIST has already moved away from advising security professionals to demand a complex list of items to include in a password as it has resulted in End User password management fatigue. Wrapping Up 2019 Cybersecurity Trend Overview Perhaps most important of all in the cybersecurity trend overview is that 2019 will likely mark a strategic shift in the way people, especially the boardroom and the C-Suite executives view cybersecurity. The security industry will also see a shift from an emphasis on “cybersecurity” to “information assurance and risk management.” If you like what you’re seeing/or listening to, be sure to hit the subscribe button here and stay in touch with all the latest business and technology news from Converge Tech Talk.

Converge TechTalk
How to Identify a Phish and How to Protect Against Phishing

Converge TechTalk

Play Episode Listen Later Dec 3, 2018 25:21


Phishing is one of the most common cybersecurity attacks and in this episode of Converge TechTalk, Mison Riggins, tech security expert from Inspired eLearning downloads everything we need to know about phishing, and how to keep your employees, and your company, safe from phishing attacks.   Phishing attacks are designed to trick people into giving up private information and/or to trick people into clicking on a malware or ransomware link that can spell big trouble for companies and their data. This kind of cyberattack is one of the most common tactics cyber criminals use and can happen in a number of different ways: Phishing, SMiShing, and Vishing.   These names relate to the different channels that cyber criminals use to reach prospective targets. Phishing relies on email as a channel, Smishing relies on SMS messaging, and Vishing relies on voice as a channel to reach victims.   Mison and I cover a myriad of details related to phishing, and how companies can help employees learn what they need to know about phishing, wise up to attackers’ ploys aimed at getting private information and/or breaching corporate security systems, and protect both themselves and their companies from this type of security breach. We also cover what to do if you suspect or discover you’re been the victim of phishing attack and the immediate steps you should take.   Mison is speaking at the Data Connectors’ Cybersecurity Strategies Conference in Dallas on Wednesday, December 5th.  As part of her presentation, Mison will demonstrate to the audience how to create a phish, which is designed as a training exercise. She’s pretty confident that once you know how to create a phish, chances are good that you’ll be able to quickly identify phishing attacks in the future, and know how to more effectively protect against them.