Podcast appearances and mentions of steve ragan

  • 14PODCASTS
  • 42EPISODES
  • 28mAVG DURATION
  • ?INFREQUENT EPISODES
  • May 26, 2023LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about steve ragan

Latest podcast episodes about steve ragan

Paul's Security Weekly
ESW #319 - Amitai Ratzon, Steve Ragan, Deepika Chauhan, Thomas Kinsella, Jon Check

Paul's Security Weekly

Play Episode Listen Later May 26, 2023 145:11


On this edition of the ESW news, we're all over the place! Funding and acquisitions are a little sad right now, but AI and TikTok bans raise our spirits. The hosts are split on feelings about the new .zip gTLD, there's a new standard for scoring an "AI Influence Level" (AIL), and lessons learned from Joe Sullivan's case and other Uber breaches. Also, don't miss the new AI tool DragGAN, which enables near magical levels of ease when manipulating photos.   What's even real anymore? We might not be able to tell for long... The reality is no organization is insusceptible to a breach – and security teams, alongside the C-suite, should prepare now to make the response more seamless once a crisis does happen. Based on his experience working 1:1 with security leaders in the private and public sectors, Jon Check, executive director of Cyber Protection Solutions at Raytheon Intelligence & Space, will share the critical steps organizations must take to best prepare for a security breach. This segment is sponsored by Raytheon. Visit https://securityweekly.com/raytheonrsac to learn more about them!   While companies utilize dozens of security solutions, they continue to be compromised and are continually searching for their real cybersecurity gaps amongst the overload of vulnerability data. A primary issue security teams face is that they lack a way to continuously validate the effectiveness of the different security solutions they have in place. Automated Security Validation is revolutionizing cybersecurity by applying software validation algorithms, for what was once manual penetration testing jobs. It takes the attacker's perspective to challenge the integrity and resilience of security defenses by continuously emulating cyber attacks against them. This segment is sponsored by Pentera. Visit https://securityweekly.com/penterarsac to learn more about them!   Security teams are always on the lookout for external threats that can harm our organizations. However, an internal threat can derail productivity and lead to human error and burnout: repetitive, mundane tasks. To effectively defend against evolving threats, organizations must leverage no-code automation and free analysts to focus on higher-level projects that can improve their organization's security posture. This segment is sponsored by Tines. Visit https://securityweekly.com/tinesrsac to learn more about them!   In today's hyper-connected world, devices are everywhere, people are online constantly and sensitive data has moved to the cloud. Given these trends, organizations are making digital trust a strategic imperative. More than ever, companies need a unified platform, modern architecture and flexible deployment options in order to put digital trust to work. This segment is sponsored by DigiCert. Visit https://securityweekly.com/digicertrsac to learn more about them!   Bill Brenner, VP of content strategy at CyberRisk Alliance, and Cisco storyteller/team leader/editor Steve Ragan discuss the issues security professionals are sinking their teeth into at RSA Conference 2023, including: Threats organizations face amid geopolitical strife (Russia/Ukraine, China, North Korea) What SOCs need to respond to a world on fire (training for cloud-based ops, XDR) Challenges of identity and access management (zero trust, MFA, hybrid work environments) Challenges of vulnerability management (finding the most critical flaws in the cloud, key attack vectors in 2023, ransomware) This segment is sponsored by Cisco. Visit https://securityweekly.com/ciscorsac to learn more about them!   Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly   Show Notes: https://securityweekly.com/esw319 

Enterprise Security Weekly (Audio)
ESW #319 - Amitai Ratzon, Steve Ragan, Deepika Chauhan, Thomas Kinsella, Jon Check

Enterprise Security Weekly (Audio)

Play Episode Listen Later May 26, 2023 145:11


On this edition of the ESW news, we're all over the place! Funding and acquisitions are a little sad right now, but AI and TikTok bans raise our spirits. The hosts are split on feelings about the new .zip gTLD, there's a new standard for scoring an "AI Influence Level" (AIL), and lessons learned from Joe Sullivan's case and other Uber breaches. Also, don't miss the new AI tool DragGAN, which enables near magical levels of ease when manipulating photos.   What's even real anymore? We might not be able to tell for long... The reality is no organization is insusceptible to a breach – and security teams, alongside the C-suite, should prepare now to make the response more seamless once a crisis does happen. Based on his experience working 1:1 with security leaders in the private and public sectors, Jon Check, executive director of Cyber Protection Solutions at Raytheon Intelligence & Space, will share the critical steps organizations must take to best prepare for a security breach. This segment is sponsored by Raytheon. Visit https://securityweekly.com/raytheonrsac to learn more about them!   While companies utilize dozens of security solutions, they continue to be compromised and are continually searching for their real cybersecurity gaps amongst the overload of vulnerability data. A primary issue security teams face is that they lack a way to continuously validate the effectiveness of the different security solutions they have in place. Automated Security Validation is revolutionizing cybersecurity by applying software validation algorithms, for what was once manual penetration testing jobs. It takes the attacker's perspective to challenge the integrity and resilience of security defenses by continuously emulating cyber attacks against them. This segment is sponsored by Pentera. Visit https://securityweekly.com/penterarsac to learn more about them!   Security teams are always on the lookout for external threats that can harm our organizations. However, an internal threat can derail productivity and lead to human error and burnout: repetitive, mundane tasks. To effectively defend against evolving threats, organizations must leverage no-code automation and free analysts to focus on higher-level projects that can improve their organization's security posture. This segment is sponsored by Tines. Visit https://securityweekly.com/tinesrsac to learn more about them!   In today's hyper-connected world, devices are everywhere, people are online constantly and sensitive data has moved to the cloud. Given these trends, organizations are making digital trust a strategic imperative. More than ever, companies need a unified platform, modern architecture and flexible deployment options in order to put digital trust to work. This segment is sponsored by DigiCert. Visit https://securityweekly.com/digicertrsac to learn more about them!   Bill Brenner, VP of content strategy at CyberRisk Alliance, and Cisco storyteller/team leader/editor Steve Ragan discuss the issues security professionals are sinking their teeth into at RSA Conference 2023, including: Threats organizations face amid geopolitical strife (Russia/Ukraine, China, North Korea) What SOCs need to respond to a world on fire (training for cloud-based ops, XDR) Challenges of identity and access management (zero trust, MFA, hybrid work environments) Challenges of vulnerability management (finding the most critical flaws in the cloud, key attack vectors in 2023, ransomware) This segment is sponsored by Cisco. Visit https://securityweekly.com/ciscorsac to learn more about them!   Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly   Show Notes: https://securityweekly.com/esw319 

Paul's Security Weekly TV
Digital Trust as a Strategic Imperative & Insights from RSA Conference 2023 - Deepika Chauhan, Steve Ragan - ESW #319

Paul's Security Weekly TV

Play Episode Listen Later May 26, 2023 25:47


In today's hyper-connected world, devices are everywhere, people are online constantly and sensitive data has moved to the cloud. Given these trends, organizations are making digital trust a strategic imperative. More than ever, companies need a unified platform, modern architecture and flexible deployment options in order to put digital trust to work. This segment is sponsored by DigiCert. Visit https://securityweekly.com/digicertrsac to learn more about them!   Bill Brenner, VP of content strategy at CyberRisk Alliance, and Cisco storyteller/team leader/editor Steve Ragan discuss the issues security professionals are sinking their teeth into at RSA Conference 2023, including: Threats organizations face amid geopolitical strife (Russia/Ukraine, China, North Korea) What SOCs need to respond to a world on fire (training for cloud-based ops, XDR) Challenges of identity and access management (zero trust, MFA, hybrid work environments) Challenges of vulnerability management (finding the most critical flaws in the cloud, key attack vectors in 2023, ransomware) This segment is sponsored by Cisco. Visit https://securityweekly.com/ciscorsac to learn more about them!   Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw319 

Enterprise Security Weekly (Video)
Digital Trust as a Strategic Imperative & Insights from RSA Conference 2023 - Deepika Chauhan, Steve Ragan - ESW #319

Enterprise Security Weekly (Video)

Play Episode Listen Later May 26, 2023 25:47


In today's hyper-connected world, devices are everywhere, people are online constantly and sensitive data has moved to the cloud. Given these trends, organizations are making digital trust a strategic imperative. More than ever, companies need a unified platform, modern architecture and flexible deployment options in order to put digital trust to work. This segment is sponsored by DigiCert. Visit https://securityweekly.com/digicertrsac to learn more about them!   Bill Brenner, VP of content strategy at CyberRisk Alliance, and Cisco storyteller/team leader/editor Steve Ragan discuss the issues security professionals are sinking their teeth into at RSA Conference 2023, including: Threats organizations face amid geopolitical strife (Russia/Ukraine, China, North Korea) What SOCs need to respond to a world on fire (training for cloud-based ops, XDR) Challenges of identity and access management (zero trust, MFA, hybrid work environments) Challenges of vulnerability management (finding the most critical flaws in the cloud, key attack vectors in 2023, ransomware) This segment is sponsored by Cisco. Visit https://securityweekly.com/ciscorsac to learn more about them!   Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw319 

The Mitch Albom Show
Steve Ragan - The Mitch Albom Show - November 15, 2022

The Mitch Albom Show

Play Episode Listen Later Nov 16, 2022 3:58


Steve Ragan is the Co-chair of National Philanthropy Day Awards Committee. He Joins The Mitch Albom Show to discuss National Philanthropy Day.

mitch albom steve ragan
The CyberWire
Trojan Source--a threat to the software supply chain. Ransomware goes to influence operations school. Triple extortion? Criminal target selection.

The CyberWire

Play Episode Listen Later Nov 2, 2021 27:56


Researchers describe Trojan Source, a hard-to-detect threat to the software supply chain. A ransomware gang takes a page from the information operator's book. From double extortion to triple extortion, as other ransomware gangs add distributed denial-of-service to encryption and doxing. Criminals are now hacking on material, non-public information, the FBI warns. Joe Carrigan looks at multifactor adoption at Twitter. Our guest is Steve Ragan from Akamai on API security. And criminals hit healthcare providers in Newfoundland. For links to all of today's stories check out our CyberWire daily news briefing: https://www.thecyberwire.com/newsletters/daily-briefing/10/211

Hacker History Podcast
The history of Steve Ragan

Hacker History Podcast

Play Episode Listen Later Jun 30, 2021 34:05


Hacker History sits down with Steve Ragan. Steve tells us about his early years of computer games, hacking, warez, modems, and dumpster diving. He eventually ends up as a security journalist and now is responsible for the yearly State of the Internet report. Show Notes Steve Ragan State of the Internet report

Decipher Security Podcast

Steve Ragan, security researcher with Akamai, joins Lindsey O’Donnell-Welch to discuss the evolution of phishing kits over the past year, and how attacks on the identity and trust model will change as employees start to go back into the office.

akamai steve ragan
Security Nation
Nontraditional Paths Into Security, Part 2: How Steve Ragan Innovates at the Intersection of Journalism and Tech

Security Nation

Play Episode Listen Later Feb 4, 2021 38:03


In our latest episode of Security Nation, Steve Ragan joined the podcast to discuss his unlikely journey from reluctant security expert to journalist. For Steve, having the tech knowledge is important, but so is crafting a good story.    We take deep dives on topics like where the industry was in the ‘90s plus the unique way he approaches Akamai’s “The State of the Internet” report (and their own podcast). We’ll hear why writing with empathy is a foundation of Steve’s process when tackling deeper technical subjects. Also, the joys of shameless self-promotion...  Stick around for our Rapid Rundown, where we get quite the rapid rundown of three big events in security: North Korea’s campaign targeting security researchers, the takedown of the Emotet botnet, and (most importantly) the long-awaited cracking of Tod’s seven-year-old Dogecoin CTF.     

Retail Remix
Are the Holidays Creating More Cybersecurity Risk?

Retail Remix

Play Episode Listen Later Nov 23, 2020 37:44


Many of us know the risks of creating obvious and uncomplicated passwords like "password123," "12345," or (gulp) our name and birthday. But has that really stopped us from changing our ways? Not really, according to Steve Ragan, Lead Security Researcher at Akamai. Ragan has been covering the cybersecurity space for about 15 years and he believes that although the threats have become more sophisticated and widespread, retailers' and consumers' response plans haven't changed effectively. As a result, retail and hospitality businesses have become prime targets. According to Akamai's State of the Internet Report, 90% of all credential stuffing attacks during a two-year period targeted retail.

@BEERISAC: CPS/ICS Security Podcast Playlist
IOCs and CVEs in the OT - Ep 002

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Oct 26, 2020 41:52


Podcast: Technical OutcastEpisode: IOCs and CVEs in the OT - Ep 002Pub date: 2020-10-25Today we're joined by Ron Brash, the Director of Cyber Security Insights at Verve Industrial Protection. In this episode, Steve and Ron talk about operational technologies (OT), and how CVEs are a tricky task to tackle these days. In addition, the two discuss the issues related to Ripple 20 - the collection of zero-day vulnerabilities in a widely used low-level TCP/IP software library developed by Treck, Inc that were disclosed by JSOF.The podcast and artwork embedded on this page are from Steve Ragan, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Salted Hash
Talking DerbyCon, spy chip whispers and Google's data breach | Ep 47

Salted Hash

Play Episode Listen Later Oct 15, 2018 31:53


Steve Ragan and J.M. Porup catch up post-DerbyCon conference to discuss psychological issues in the infosec community, supply chain security and whether it's time to make China the boogeyman again, as well as Google's recent data breach.

Salted Hash
Smart cities and security vulnerabilities | Salted Hash Ep 46

Salted Hash

Play Episode Listen Later Aug 30, 2018 12:14


In this episode, host Steve Ragan talks with Charles Henderson, global managing partner at IBM's X-Force Red, about smart cities and the potential vulnerabilities in IoT, as well as Daniel Crowley, research director at X-Force Red.

iot smart cities hash salted security vulnerabilities charles henderson x force red steve ragan daniel crowley
Salted Hash
An introduction to Kit Hunter, a phishing kit detector | Salted Hash Ep 40

Salted Hash

Play Episode Listen Later Aug 24, 2018 6:50


Kit Hunter, a basic Python script written by host Steve Ragan, searches on common tag elements to find hidden phishing kits on a web server.

Salted Hash
VirusTotal Intelligence, a search engine for malware | Salted Hash Ep 45

Salted Hash

Play Episode Listen Later Aug 24, 2018 7:27


In this episode, host Steve Ragan talks with Karl Hiramoto, technical solutions consultant for VirusTotal, maker of VirusTotal Intelligence, a searchable detection tool for malware.

Salted Hash
Detecting bot attacks | Salted Hash Ep 44

Salted Hash

Play Episode Listen Later Aug 24, 2018 7:11


In this episode, host Steve Ragan talks with Engin Akyol, CTO at Distil Networks at the Black Hat 2018 conference, about bot account takeovers and how they can be detected.

Salted Hash
An inside look at hybrid Office 365 phishing attacks | Salted Hash Ep 41

Salted Hash

Play Episode Listen Later Aug 24, 2018 10:04


In this episode, Steve Ragan shows what a hybrid phishing attack looks like as it starts off on one service, and quickly moves to another.

Salted Hash
What is a phishing kit? Listen to this in-depth explainer | Salted Hash Ep 39

Salted Hash

Play Episode Listen Later Aug 24, 2018 15:13


What is a phishing kit? In this podcast, Steve Ragan offers an answer and a look at some of the kits Salted Hash has collected.

Salted Hash
Don't ignore application security | Salted Hash Ep 35

Salted Hash

Play Episode Listen Later Aug 23, 2018 18:17


In this episode, Michael Feiertag, CEO and co-founder of tCell, joins host Steve Ragan to talk about why application security is more critical than ever and why it's just now getting more attention from security teams.

Salted Hash
The difference between red team engagements and vulnerability assessments | Salted Hash Ep 34

Salted Hash

Play Episode Listen Later Aug 23, 2018 15:56


In this episode, host Steve Ragan talks with Phil Grimes, Professional Services Lead at RedLegg, about the challenges of educating customers — and building a partnership with them — to create successful red team engagements.

Salted Hash
Phishing problems: 3.2M emails blocked in a month | Salted Hash Ep 37

Salted Hash

Play Episode Listen Later Aug 23, 2018 17:24


Asaf Cidon, vice president of email security at Barracuda Networks, talks with host Steve Ragan about a recent uptick in phishing attacks, including a spike in business email compromise (BEC) attacks.

Salted Hash
Conversation hijacking attacks | Salted Hash Ep 38

Salted Hash

Play Episode Listen Later Aug 23, 2018 15:46


Troy Gill, manager of security research at AppRiver, explains conversation hijacking attacks, or CHAs, with host Steve Ragan, including who is typically targeted and how to prevent them.

Salted Hash
The difference between red team engagements and vulnerability assessments | Salted Hash Ep 34

Salted Hash

Play Episode Listen Later Jul 9, 2018 15:56


In this episode, host Steve Ragan talks with Phil Grimes, Professional Services Lead at RedLegg, about the challenges of educating customers — and building a partnership with them — to create successful red team engagements.

Salted Hash
Get a hands-on, inside look at the dark web | Salted Hash Ep 25

Salted Hash

Play Episode Listen Later May 23, 2018 10:23


Reporting from RSA 2018, host Steve Ragan helps dispel the hype and confusion surrounding the dark web, as he talks with Alon Arvatz, co-founder at IntSights.

Salted Hash
Defending against mobile technology threats | Salted Hash Ep 24

Salted Hash

Play Episode Listen Later May 23, 2018 8:12


What are the current dangers in mobile technology and what are the strategies to keep yourself protected? Join host Steve Ragan from the show floor at RSA 2018, where he talks with Will LaSala, director of Security Solutions and security evangelist at VASCO Data Security.

Salted Hash
Scammers spoof Office 365, DocuSign and others | Salted Hash Ep 21

Salted Hash

Play Episode Listen Later Mar 5, 2018 16:48


As phishing attacks evolve, hackers are using customization and targeted scams to ensnare users. Asaf Cidon, vice president, email security services at Barracuda, talks with host Steve Ragan about the ever-changing cat-and-mouse game of phishing.

Salted Hash
GDPR deadline looms: The price and penalties | Salted Hash Ep 20

Salted Hash

Play Episode Listen Later Feb 26, 2018 13:30


With the General Data Protection Regulation (GDPR) deadline fast approaching, host Steve Ragan explores the implications of noncompliance for companies -- and possible penalties -- with Greg Reber, founder/CEO of AsTech Consulting.

Salted Hash
Ransomware: Do you pay the ransom? | Salted Hash Ep 19

Salted Hash

Play Episode Listen Later Feb 20, 2018 15:13


Robert Gibbons, CTO at Datta, joins host Steve Ragan to talk about why companies pay out ransoms, the role of incident response plans and continuity strategies, and how companies weigh the risks.

cto ransomware hash salted datta robert gibbons steve ragan
Salted Hash
Mobile security and privacy for activists worldwide | Salted Hash Ep 18

Salted Hash

Play Episode Listen Later Feb 12, 2018 15:51


Nathan Freitas, who heads The Guardian Project, talks with host Steve Ragan and senior writer J.M. Porup about the group's easy-to-use secure apps, open-source software libraries, and customized mobile devices being used around the world.

Salted Hash
Ready for the EU's GDPR compliance deadline? Many companies aren't | Salted Hash Ep 16

Salted Hash

Play Episode Listen Later Feb 6, 2018 22:47


CSO senior editor Michael Nadeau joins host Steve Ragan to talk about predictions for 2018, including the looming GDPR compliance deadline.

Salted Hash
The people you call when you've had a breach | Salted Hash Ep 15

Salted Hash

Play Episode Listen Later Feb 6, 2018 31:09


Rob Lee, faculty fellow at the SANS Technology Institute, talks with host Steve Ragan about his group's work to help companies out of sticky situations, plus the state of the security industry and predictions for 2018.

breach hash salted rob lee sans technology institute steve ragan
Salted Hash
How to build a security career | Salted Hash Ep 5

Salted Hash

Play Episode Listen Later Dec 14, 2017 32:22


What does it mean to be a security professional? CSO's Fahmida Rashid and Steve Ragan break down what it takes to get ahead in the field.

Salted Hash
Zero trust systems, dentity authentication permeate enterprise security strategy | Salted Hash Ep 12

Salted Hash

Play Episode Listen Later Dec 14, 2017 25:40


Executives at cloud services vendor Akamai -- David Lewis, global security advocate; Andy Ellis, CSO; and Charlie Gero, CTO -- talk with host Steve Ragan about the evolving role of security in the enterprise.

Salted Hash
Pilot | Salted Hash Ep 1

Salted Hash

Play Episode Listen Later Dec 14, 2017 42:21


Reporters Fahmida Rashid and Steve Ragan talk about antivirus vendor Kaspersky Lab, a Russian-based company that various U.S. agencies have flagged as untrustworthy. Should you use it?

Salted Hash
The Equifax breach, incident response and the future of passwords | Salted Hash Ep 2

Salted Hash

Play Episode Listen Later Dec 14, 2017 27:50


So much of security comes down to 4 little words: Keep it simple, stupid. CSO’s Steve Ragan and Fahmida Rashid explain why there’s no magical mystery cure for ransomware. Also, how much is data from the Equifax breach worth? (Hint: It's a whole lot less than you might think.)

Salted Hash
Phishing, application security and cool tools | Salted Hash Ep 3

Salted Hash

Play Episode Listen Later Dec 14, 2017 26:48


CSO's Fahmida Rashid and Steve Ragan dig into the latest phishing attempts (and how to sidestep them), plus the debate over application security, and some cool new tools.

Salted Hash
Attribution, AI and hacking | Salted Hash Ep 4

Salted Hash

Play Episode Listen Later Dec 14, 2017 25:11


Does attack attribution really matter? CSO's Fahmida Rashid and Steve Ragan argue that what, when and how a breach happened are the most immediate concerns. Who did it comes later.

Salted Hash
Ransomware marketplaces and the future of malware | Salted Hash Ep 6

Salted Hash

Play Episode Listen Later Dec 8, 2017 21:33


Would you give up a customer's data or credentials if that was the demand in a ransomware attack? That's just one of the nightmare scenarios that Steve Ragan and Rick McElroy talk about on this week's episode.

Salted Hash
Matrix Banker malware spreads to multiple industries | Salted Hash Ep 7

Salted Hash

Play Episode Listen Later Dec 8, 2017 10:27


The Matrix Banker malware, first found in Latin America, is now gaining a foothold in diversified targets. Steve Ragan breaks down the threat with Justin Fier, director for cyber intelligence and analysis at Darktrace.

Salted Hash
What keeps IT administrators up at night? Ransomware, for one | Salted Hash Ep 8

Salted Hash

Play Episode Listen Later Dec 8, 2017 27:19


A solid backup policy and frequent awareness training can reduce the risk of ransomware, but unintentional breaches by insiders are still a worry for administrators. Watch as Steve Ragan and Michael Nadeau talk security strategy.

administrators ransomware hash salted michael nadeau steve ragan
Exploring Information Security Archive 1
How information security professionals should interact with the media - part two

Exploring Information Security Archive 1

Play Episode Listen Later Nov 29, 2015 19:35


In this exciting edition of the Exploring Information Security podcast, Steve Ragan of CSO joins me to discuss how information security professionals should interact with the media. Steve (@SteveD3) prior to becoming an InfoSec Journalism Wizard for CSO he spent 15 years as an IT contractor. Last year Steve gave talks on how to interact with the media at conferences such as CircleCityCon and DerbyCon. With information security getting more play in the media recently it's important that we all have a basic understanding of how to interact with the media. In this episode we discuss: interacting with different types of media; contacting media to make a correction; the difference between on-the-record and off-the-record; not being afraid of the media; and a bonus story.

interact cso information security mediapart security professionals derbycon steve ragan circlecitycon exploring information security
ControlTalk Now  The Smart Buildings Podcast
ControlTalk NOW for the Week Ending December 21, 2014

ControlTalk Now The Smart Buildings Podcast

Play Episode Listen Later Dec 21, 2014 66:33


PodCast Show Notes: ControlTalk NOW thanks this week’s sponsors Contemporary Controls and International Solutions of America (ISA). 2014 ControlTrends Awards Nominees Nino DiCosmo, Tridium’s President and General Manager, and Thermokon’s North American Sales Manager, David Alliband, join us this week on ControlTalk NOW, providing unique insights into Nino DiCosmo’s high-profile executive role in running one of the world’s leading software platforms and David Alliband’s vigorous efforts to take the Thermokon product portfolio to the next level in the North American market. Contemporary Controls is your ideal partner for applying network technology to your BACnet building automation project. The industry is embracing Ethernet connectivity to Direct Digital Controllers (DDC) along with open protocols such as BACnet, Modbus, and Sedona Framework. ISA’s warehouse maintains a large inventory of new and reconditioned parts. From years of experience, we know the parts our customers need most. So in most cases, your parts are shipped within 24 hours — in many instances, the same day — saving you the expense of lengthy down-time. ControlTrends Awards Finalist Sky Foundryy: Are you drowning in a sea of Big Data? John Petze and his team at SkyFoundry have created a Building Automation Controls analytics package that allow you to easliy find the data that matters to you. Whether you are looking at trends, alarms, or faults SkyFoundry enables the creation of “Sparks” (events) that allow you to interact with your data in powerful ways that make your buildings safer and more efficient. Lynxspring Nominated for Multiple 2014 ControlTrends Awards! E-news from Marc Petock. We are pleased to announce that Lynxspring has been nominated as finalists in the 2014 Control Trend Awards in several categories. The Control Trend Awards recognize the people, product, and manufacturers in our industry that make the HVAC, Controls, and Building Automation Industry what it is today. Heads Up! Hackers Hint at Terror Attacks, Release More Data from Sony Pictures. We received this notice from IT World’s Senior Staff Writer, Steve Ragan. Now that we learned of this potential threat, we need to pass it on to the ControlTrends Community for greatest dissemination. Sony’s $60 Million dollar insurance coverage will not be enough to recover from theft of Sony Pictures Entertainment content and the leakage of more than 200GB of data, including pre-release movies, executive emails, sales and marketing data, and nearly everything from human resources. Niagara Framework Changed Our World! Tridium’s Niagara AX is nominated for the 2014 ControlTrends Awards Building Integration & Automation Software of the Year. And,understandably so. The Niagara Software platform has driven change and innovation — and made the smart connected building, as we able to perceive it, a reality. Tridium’s next gen framework, Niagara 4, whose full release is imminent, is even more awesome. CTN Interview with Tridium’s Nino DiCosmo, nominated for the 2014 ControlTrends Awards Executive of the Year, Large Manufacturer. Nino DiCosmo is an accomplished global executive recognized for commitment to setting and achieving Tridium’s vision and goals. Nino is an expert at scaling operations, building customer focused teams, and leading innovative product development. Thermokon — Keeping in Touch with the Future. Thermokon EasySens- EnOcean is nominated for the 2014 ControlTrends Wireless Product/Solution of the Year. David Alliband, Sales Manager, North America is excited about Thermokon’s continued success and the many wired and wireless products and solutions Thermokon has to offer. When Thermokon Sensortechnik GmbH was founded in 1987 by Harald Zygan in Mittenaar-Bicken, Germany, hardly anyone expected the business to grow out of this scale. CTN Interview with David Alliband, Sales Manager, North America. David Alliband reviews the variety of wired and wireless products available from Thermokon and the HVAC applications the Thermokon products are especially well-suited for. Thermokon has grown from a sensor manufacturer to a solutions provider with a broad range of highly competitive quality products available from a distributor near you. Rising Plug-in Electric Vehicle Adoption — Impacts on the Grid (Negligible, for Now). December, 2014: Six utilities that participated in DOE’s cost-shared Smart Grid Investment Grant (SGIG) program deployed in-home and public electric vehicle charging stations and evaluated customer charging behaviors and impacts on the grid. There are relatively few plug-in electric vehicles on the road today, and as a result the six SGIG projects focused on establishing the charging infrastructure with a relatively low number of stations and evaluated a small number of participating vehicles. CTN’S Smart Building Tip of the Week: Accruent’s Facility 360 — Become a Driver of Success. Convert your facility from a cost center to a strategic contributor. Great information from Accruent on how facilities management teams can play a more strategic role in organizations.7 Ways to Save Time, Costs, and Energy: Download White Paper. In a world where you must find ways to “do more with less,” finding ways to cut costs can be challenging – and time consuming. The post ControlTalk NOW for the Week Ending December 21, 2014 appeared first on ControlTrends.