Look for any podcast host, guest or anyone
Showing episodes and shows of

EM360

Shows

Tech TransformedTech TransformedThe Growth of Enterprise Tech PodcastingPodcasts have become a valuable tool for sharing knowledge on topics like cybersecurity, AI, data management, and infrastructure. EM360Tech took it even further with their expertly curated content and engaging discussions featuring industry leaders and experts.Michael Lodge, founder and CEO of EM360Tech, shares his valuable insights on the evolution of enterprise tech podcasting on Podcast Gurus by GHA Marketing.Who is EM360 Tech?EM360Tech, founded by Michael Lodge in 2008, is a leader in enterprise tech podcasting.Our platform provides podcasts and digital content for IT a...2024-08-1239 minTech TransformedTech TransformedCustomer Experience Predictions for 2024 and BeyondProf. Steven van Belleghem is an international speaker, EM360 partnered analyst and one of the world’s leading experts in customer experience.He helps the likes of Disney, Booking.com and Microsoft to develop their CX strategies by incorporating the latest technologies. He is also a highly sought-after presenter and commentator, recently sharing a stage with Barack Obama.In today’s episode of the EM360 Podcast, Head of Content Matt Harris speaks to Steven as they discuss:The customer experience landscapeWhat the biggest companies in the world are looking at right nowBuilding a customer-oriented compan...2024-02-2113 minTech TransformedTech TransformedCreating a Better World Using DataNatural disasters predicted. Accidents avoided. Lives saved. The importance of data for businesses has been well-documented - but how is it really improving the world around us?Dan Everett is The Techno Optimist; with over 25 years of experience in data and analytics, he believes that taking a human-centred and technology-enabled approach to business and societal challenges will help make the planet a better place. EM360’s Head of Content Matt Harris speaks to Dan on the EM360 Podcast today to discuss:Recent trends and the state of the enterprise Confidence in AI’s ability to sol...2023-10-1814 minTech TransformedTech TransformedEnterprise Technology and Its Power to Change the WorldGeoff Scott is a highly experienced technology leader with over two decades of experience in the enterprise technology space, specifically with SAP implementation and operations. As the CEO of ASUG, one of the largest technology communities in the world, Geoff is responsible for bringing together a massive ecosystem of purchasers, users, implementers, partners, and consultants to get the most value from enterprise technology. His passion for technology and its power to transform the world has made him a respected thought leader in the industry, inspiring innovation and success for organizations of all sizes.In...2023-10-1115 minTech TransformedTech TransformedWhy Data Events and the Data Community are so ImportantThe data community is incredibly important.From knowledge sharing and collaboration to staying updated with trends, the community of data professionals, influencers and C-level thought leaders serve as catalysts for innovation within the data realm. But why is the data community so much more active and tight than others? What are some of the biggest voices in data talking about right now? And why do events like Big Data LDN provide indispensable opportunities to really understand the world of data?In this episode of the EM360 Podcast, Head of Content Matt Harris speaks t...2023-08-3008 minTech TransformedTech TransformedAscend.io: Data Pipeline Automation and Rethinking the Modern Data StackData pipeline automation is revolutionizing the way organisations handle data. This new approach to data management is challenging the traditional modern data stack, which relied on a series of disparate tools to handle different aspects of data processing. With data pipeline automation, organizations can simplify their data stack, relying on a single tool to manage the entire process. This shift will allow businesses to focus on insights and decision-making, rather than spending time wrangling data. As a result, data pipeline automation will become the key component of the post-modern data stack.In this epis...2023-04-0424 minTech TransformedTech TransformedWorkiva: Balancing the Demands of GRC and ESGGRC (governance, risk management, and compliance) and ESG (environmental, social, and governance) are critical for companies to balance in today's business landscape. While GRC focuses on achieving objectives responsibly, mitigating risks, and meeting compliance requirements, ESG addresses a company's broader responsibilities to its stakeholders, including the environment, employees, and society as a whole.Balancing both can be challenging, but it is essential for companies to operate sustainably and responsibly. Companies that prioritise ESG practices often have better long-term financial performance, while those that prioritise GRC can avoid costly legal and reputational risks. Therefore, co...2023-03-3020 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataPivotree: Achieving Frictionless Commerce with DaaSFrictionless commerce is the ability to seamlessly find customers, establish trust, and transact and deliver products without any hiccups.However, enterprises face three significant problems in achieving frictionless commerce: getting the right data, managing tech debt, and ensuring data interoperability. And much like the old children's book "I Know an Old Lady Who Swallowed a Fly" - each problem seems to lead to another.That's where Data-as-a-Service (DaaS) comes in. A cloud-based service that provides users with on-demand access to high-quality data, it can help organisations with these challenges by providing them with accurate and...2023-03-2917 minTech TransformedTech TransformedPivotree: Achieving Frictionless Commerce with DaaSFrictionless commerce is the ability to seamlessly find customers, establish trust, and transact and deliver products without any hiccups.However, enterprises face three significant problems in achieving frictionless commerce: getting the right data, managing tech debt, and ensuring data interoperability. And much like the old children's book "I Know an Old Lady Who Swallowed a Fly" - each problem seems to lead to another.That's where Data-as-a-Service (DaaS) comes in. A cloud-based service that provides users with on-demand access to high-quality data, it can help organisations with these challenges by providing them with accurate and...2023-03-2917 minTech TransformedTech TransformedHow Intelligent Automation and Tooling Will Look in 2023Intelligent automation refers to the use of advanced technologies such as artificial intelligence, machine learning, and robotic process automation to automate business processes. This enables organisations to increase operational efficiency, reduce costs, and improve customer experience. By using intelligent automation, businesses can streamline repetitive and time-consuming tasks and free up human resources to focus on more value-added activities.In this episode of the EM360 Podcast, Head of Content Matt Harris speaks to Tom Croll, Advisor at Lionfish Tech Advisors, about:Intelligent automation and tooling trendsThe role of human improvement and how it’s ch...2023-03-2213 minTech TransformedTech TransformedRadware: Understanding Supply Chain Attacks and Client Side ProtectionSupply chain attacks occur when hackers compromise a third-party vendor's software or hardware, which then infects the vendor's customers. Such attacks can be devastating, as they allow the attacker to gain access to the systems and data of many organisations. To mitigate the risks of supply chain attacks, organisations should perform due diligence on their vendors, monitor their vendor's security practices, and implement strict access controls and network segmentation.In this episode of the EM360 Podcast, Analyst Richard Stiennon speaks to Uri Dorot, Senior Product Marketing Manager at Radware, to discuss:Supply chain attacks from...2023-03-2015 minThe Security StrategistThe Security StrategistRadware: Understanding Supply Chain Attacks and Client Side ProtectionSupply chain attacks occur when hackers compromise a third-party vendor's software or hardware, which then infects the vendor's customers. Such attacks can be devastating, as they allow the attacker to gain access to the systems and data of many organisations. To mitigate the risks of supply chain attacks, organisations should perform due diligence on their vendors, monitor their vendor's security practices, and implement strict access controls and network segmentation.In this episode of the EM360 Podcast, Analyst Richard Stiennon speaks to Uri Dorot, Senior Product Marketing Manager at Radware, to discuss:Supply chain...2023-03-2015 minTech TransformedTech TransformedAvantra: Deriving Value from Investing in Hyperautomation and AIOpsHyperautomation and AIOps are two of the most important technologies that are driving the digital transformation of businesses across the globe. The business value of Hyperautomation and AIOps is significant. By automating repetitive tasks, hyperautomation helps businesses to save time and reduce costs, while also improving accuracy and efficiency. AIOps, on the other hand, helps businesses to monitor their IT infrastructure in real-time, detect and resolve issues faster, and optimize IT operations, which ultimately leads to better business outcomes.On this episode of the EM360 Podcast, Analyst Doug Laney is joined by John Appleby...2023-03-1520 minTech TransformedTech TransformedControlling and Managing Shadow ITShadow IT refers to the use of technology and IT systems within an organization without the approval or knowledge of the central IT department. This can range from employees using their own personal devices for work purposes to departments setting up and using their own software and systems. Shadow IT can increase security risks and lead to data breaches and violations of regulatory requirements. It can also cause operational problems and slow down decision-making. In this episode of the EM360 Podcast, Head of Content Matt Harris speaks to Chris Buijs, Chief Evangelist at Eff...2023-03-1513 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataOrion Governance: Major Data Management Challenges Faced by RetailersData management is essential for retailers to manage their data effectively to gain valuable insights into customer behavior, preferences, and purchase patterns. By doing so, retailers can make data-driven decisions and improve their operations, sales, and marketing strategies.However, managing data can be challenging for retailers due to the volume, variety, and velocity of data generated by multiple sources, such as social media, mobile devices, and online platforms. Retailers must also comply with data privacy regulations and ensure the security of their customers' personal information. Additionally, they need to invest in advanced technology and skilled p...2023-03-1409 minTech TransformedTech TransformedOrion Governance: Major Data Management Challenges Faced by RetailersData management is essential for retailers to manage their data effectively to gain valuable insights into customer behavior, preferences, and purchase patterns. By doing so, retailers can make data-driven decisions and improve their operations, sales, and marketing strategies.However, managing data can be challenging for retailers due to the volume, variety, and velocity of data generated by multiple sources, such as social media, mobile devices, and online platforms. Retailers must also comply with data privacy regulations and ensure the security of their customers' personal information. Additionally, they need to invest in advanced technology and skilled p...2023-03-1409 minTech TransformedTech TransformedThe Do’s and Don’ts of Risk ManagementRisk management is the process of identifying, assessing, and controlling threats to an organisation's capital and earnings. These risks can come in many forms, including market risk, credit risk, operational risk, and others. Effective risk management helps companies minimize the potential impact of negative events, protect their reputation, and ensure the stability of their operations.In this episode of the EM360 Podcast, Head of Content Matt Harris speaks to Phil Robinson, Founder of Prism Infosec and David Adams, GRC Security Consultant at Prism Infosec, about: How businesses should select their risk methodologySecurity teams and ho...2023-03-0816 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataAgile Lab: Implementing Data Mesh InitiativesIn traditional data architecture, data was always centralised in a data warehouse or a data lake and governed by a centralised team. However, with the rise of distributed systems, microservices, and agile methodologies, this approach has proven to be inadequate for managing data at scale. Data Mesh proposes a different approach, where data is treated as a product and owned by the teams that produce it. In other words, it's a way of thinking about data management that focuses on decentralisation and autonomy. But how can companies use this to their advantage?In th...2023-03-0628 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataEcho Analytics: The Time to Invest in Location Intelligence is NowLocation intelligence. Location intelligence is crucial for a company's data-driven decision-making process, providing insights into the relationship between location and business operations. It helps identify new market opportunities, optimize operations, improve customer experiences, mitigate risks, and provide a competitive advantage.By analyzing location-specific information, companies can make informed decisions that drive growth, reduce costs, and increase profitability. Ultimately, location intelligence is a valuable tool for companies seeking to make strategic decisions that optimize operations, enable growth, and gain a competitive edge in their respective industries.In this episode of the EM360 Podcast, Analyst Susan Walsh spe...2023-03-0627 minTech TransformedTech TransformedEcho Analytics: The Time to Invest in Location Intelligence is NowLocation intelligence. Location intelligence is crucial for a company's data-driven decision-making process, providing insights into the relationship between location and business operations. It helps identify new market opportunities, optimize operations, improve customer experiences, mitigate risks, and provide a competitive advantage.By analyzing location-specific information, companies can make informed decisions that drive growth, reduce costs, and increase profitability. Ultimately, location intelligence is a valuable tool for companies seeking to make strategic decisions that optimize operations, enable growth, and gain a competitive edge in their respective industries.In this episode of the EM360 Podcast, Analyst Susan Walsh spe...2023-03-0627 minTech TransformedTech TransformedAgile Lab: Implementing Data Mesh InitiativesIn traditional data architecture, data was always centralised in a data warehouse or a data lake and governed by a centralised team. However, with the rise of distributed systems, microservices, and agile methodologies, this approach has proven to be inadequate for managing data at scale. Data Mesh proposes a different approach, where data is treated as a product and owned by the teams that produce it. In other words, it's a way of thinking about data management that focuses on decentralisation and autonomy. But how can companies use this to their advantage?In th...2023-03-0628 minTech TransformedTech TransformedHoneycomb: Measuring the Success of an Incident Response ProgramIncident response is the action taken to detect, triage, analyse, and remediate problems in software with the ultimate goal of minimising damage and restoring normal business functionality as quickly as possible. A well-executed incident response plan can help organisations mitigate the impact of security incidents and maintain the trust of their customers and stakeholders, but how specifically can the efficacy of an incident response program be assessed?In this episode of the EM360 Podcast, RedMonk analyst Kate Holterhoff spoke to Fred Hebert, Staff Site Reliability Engineer at Honeycomb, as they explore:Why some metrics are be...2023-03-0219 minThe Security StrategistThe Security StrategistHoneycomb: Measuring the Success of an Incident Response ProgramIncident response is the action taken to detect, triage, analyse, and remediate problems in software with the ultimate goal of minimising damage and restoring normal business functionality as quickly as possible. A well-executed incident response plan can help organisations mitigate the impact of security incidents and maintain the trust of their customers and stakeholders, but how specifically can the efficacy of an incident response program be assessed?In this episode of the EM360 Podcast, RedMonk analyst Kate Holterhoff spoke to Fred Hebert, Staff Site Reliability Engineer at Honeycomb, as they explore:Why some metrics are be...2023-03-0219 minTech TransformedTech TransformedOrigins of Business Agility and Why Companies Need itBusiness agility refers to the ability of a company to quickly adapt and respond to changes in the market and customer demands. In today's fast-paced business environment, companies need to be nimble and flexible to remain competitive and succeed.Agile practices have become a key factor in achieving business agility, with organizations adopting methodologies such as Scrum, Kanban, and Lean. These practices focus on collaboration, continuous improvement, and delivering value to customers as quickly as possible. In this episode of the EM360 Podcast, Head of Content Matt Harris speaks to Arie van Bennekum, Business Agility pion...2023-03-0116 minTech TransformedTech TransformedThe Future of Enterprise Metaverse-as-a-ServiceCompanies are using the metaverse in the workplace in a variety of ways. From using virtual reality environments to allow remote employees to work together as if they were in the same physical space, to using virtual events and trade shows to showcase their products and services to a global audience, the metaverse is a growing commodity for forward-thinking companies.The metaverse is now proving to be a versatile tool for companies looking to enhance the workplace experience for employees, but what are its risks and drawbacks? Are some companies right to be reluctant?2023-02-2210 minTech TransformedTech TransformedHyperproof: The Truth Behind Automating Compliance ControlsAutomating compliance controls refers to the use of technology to manage and monitor compliance with regulations and laws. The purpose of automating compliance controls is to ensure that organizations meet their obligations in a consistent and efficient manner, while reducing the risk of non-compliance.Automating these controls can provide significant benefits to organizations. It can help to reduce the risk of non-compliance, increase efficiency and consistency, and save time and resources. However, it’s essential that automation should not be seen as a replacement for human oversight.In this episode of the...2023-02-1620 minTech TransformedTech TransformedHow Enterprises Need to Manage Third-Party Risk in 2023Managing third-party risk has become an increasingly important concern for enterprises as the use of third-party vendors and partners continues to grow in the business world.In the wake of Uber’s second third-party breach from vendor Teqtivity in December, resulting in a data dump of almost 80,000 Uber employees’ personal information, serious questions needed to be asked about what companies should be doing differently. In this episode of the EM360 Podcast, Head of Content Matt Harris speaks to Paul Valente, CEO at VISO Trust, to explore:Facing security challenges with third-party vendorsPositioning third-party risk to CXO...2023-02-1514 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataInformatica: Using Data to Create a 360-Degree View of Your BusinessData is the backbone of any successful business, and having a 360-degree view of it is crucial to understand the key metrics and drivers of the organization. By collecting, processing, and analyzing data from various sources such as customer interactions, financial transactions, and employee performance, your business can gain valuable insights into its operations. This 360-degree view of the business data will allow your company to take a data-driven approach to decision-making, leading to better results and improved performance.In this episode of the EM360 Podcast, Analyst Susan Walsh speaks to Dan Everett, VP of...2023-02-1322 minTech TransformedTech TransformedInformatica: Using Data to Create a 360-Degree View of Your BusinessData is the backbone of any successful business, and having a 360-degree view of it is crucial to understand the key metrics and drivers of the organization. By collecting, processing, and analyzing data from various sources such as customer interactions, financial transactions, and employee performance, your business can gain valuable insights into its operations. This 360-degree view of the business data will allow your company to take a data-driven approach to decision-making, leading to better results and improved performance.In this episode of the EM360 Podcast, Analyst Susan Walsh speaks to Dan Everett, VP of...2023-02-1322 minTech TransformedTech TransformedData Ethics Will Shape Company Decisions in 2023Data ethics. The ever-changing landscape of how people perceive their personal data - and how companies use it - has been the subject of debate as data collection becomes more and more commonplace. With US politics heading for data protection laws that could rival the severity of GDPR and consumers more aware than ever of how much their data is worth, what trends will we see arise in the next 12 months on an enterprise level?In this episode of the EM360 Podcast, Head of Content Matt Harris speaks to Zaira Pirzada, Security and Risk Management Ad...2023-02-0815 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataMonte Carlo: Establishing Trust through Data ObservabilityData observability refers to the ability to collect, measure, and analyse data from various sources in order to understand the current state and behaviour of a system.This includes monitoring the system's performance, availability, and errors, as well as identifying patterns and anomalies in the data. By implementing data observability, organisations can gain insights into their systems and make data-driven decisions to improve performance, optimize resources, and reduce costs. Common tools used for data observability include logging, metrics, tracing, and alerting. In this episode of the EM360 Podcast, Analyst Christina Stathopoulos speaks to Lior...2023-02-0629 minTech TransformedTech TransformedMonte Carlo: Establishing Trust through Data ObservabilityData observability refers to the ability to collect, measure, and analyse data from various sources in order to understand the current state and behaviour of a system.This includes monitoring the system's performance, availability, and errors, as well as identifying patterns and anomalies in the data. By implementing data observability, organisations can gain insights into their systems and make data-driven decisions to improve performance, optimize resources, and reduce costs. Common tools used for data observability include logging, metrics, tracing, and alerting. In this episode of the EM360 Podcast, Analyst Christina Stathopoulos speaks to Li...2023-02-0629 minTech TransformedTech TransformedAvoid Email When Transferring Sensitive DataEmail security is vitally important for modern companies, with 95% using email as their main communication tool and 80% using email for sensitive data transfers. But is this a mistake? Has email security fallen behind compared to other methods of communication? And what’s the alternative?In this episode of the EM360 Podcast, Head of Content Matt Harris speaks to Adam Low, CTO at Zivver, as they explore:Progressive digital securityIs email the worst way to transfer sensitive data?The role of security awareness training2023-02-0112 minTech TransformedTech TransformedDigital Forensic Challenges in the Police ForceDigital forensics have transformed crime prevention and the handling of cases permanently. With over 5,000 British police officers able to work cases remotely and upload sensitive evidence directly to the cloud, forensic investigations that could have taken days or even weeks to resolve can now be dealt with instantaneously. So how have strides in technology led to clearing case backlogs, securing faster convictions for violent criminals and bringing faster closure to victims and their families?In this episode of the EM360 Podcast, Head of Content Matt Harris speaks to West Midlands Police’s Detective John...2023-01-2521 minTech TransformedTech TransformedChronosphere: The State of Cloud-Native ObservabilityCloud-native observability is a practice of rapidly detecting and remediating issues in complex and distributed systems.Observability of cloud-native environments is important because it helps to ensure that these applications and infrastructure are running smoothly and effectively. To achieve this, enterprises typically use a combination of tools to ensure critical systems are highly reliable and performantIn this episode of the EM360 Podcast, EMA Analyst Torsten Volk joins Rachel Dines, Head of Product and Developer Marketing at Chronosphere to discuss:Cloud-native observability in 2023Helping with employee burnout and retentionCost issues with legacy tools and...2023-01-2326 minTech TransformedTech TransformedHow Cyber Warfare is Changing Cybersecurity ForeverCyber warfare has changed cybersecurity forever. Rising tensions across the world have seen multiple state-sponsored attacks hit states like Ukraine, China and the US. With global superpowers spending millions on their cyberdefence strategies, are there any lessons that the enterprise can take away?In this episode of the EM360 Podcast, Head of Content Matt Harris speaks to Jeremy Strozer, Advisor at Lionfish Tech Advisors about:Cybersecurity’s role in modern warfare Strategic cyber intelligence The biggest cybersecurity challenge of 2023 2023-01-1814 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataInformatica: Predictive Data Intelligence and Leveling Up Your BusinessPredictive data intelligence is the use of data, AI-driven algorithms, and machine learning techniques to quickly connect data consumers with the most relevant data they need to drive their business initiatives and deliver greater value.The goal of predictive analytics is to go beyond simply describing data to enable data consumers to accelerate the next-best actions to take for more effective decision making. For example, a retailer can understand their most relevant and high-quality data sets to better forecast consumer demand for a product, or a financial institution may identify the most accurate, complete customer data used...2023-01-1627 minTech TransformedTech TransformedInformatica: Predictive Data Intelligence and Leveling Up Your BusinessPredictive data intelligence is the use of data, AI-driven algorithms, and machine learning techniques to quickly connect data consumers with the most relevant data they need to drive their business initiatives and deliver greater value.The goal of predictive analytics is to go beyond simply describing data to enable data consumers to accelerate the next-best actions to take for more effective decision making. For example, a retailer can understand their most relevant and high-quality data sets to better forecast consumer demand for a product, or a financial institution may identify the most accurate, complete customer data used...2023-01-1627 minTech TransformedTech TransformedPortworx: Driving Data Services and Making Developers’ Lives EasierContainerisation is a method of packaging applications in a way that allows them to be easily deployed and run in different computing environments.Containers allow applications to be easily moved between different environments, such as different servers, cloud platforms, or local development environments, without the need to worry about compatibility issues. This makes it easier to develop, test, and deploy applications, as well as to scale and manage them in production.In this episode of the EM360 Podcast, Analyst Richard Stiennon joins Sarvesh Jagannivas, VP of Marketing at Portworx to explore:Containerisation and wh...2023-01-1220 minTech TransformedTech TransformedWhy Companies Need to Care about Contract Lifecycle ManagementContract Lifecycle Management automates and streamlines everything related to a business' contract processes.From authoring and sharing to signing and approving, contracts play a massive role in how businesses deal and correspond with the rest of the market. In this episode of the EM360 Podcast, Editor Matt Harris speaks to Ronan Copeland, Group Vice President & General Manager EMEA at DocuSign, about: Digitising contracts and their managementPost Covid digitalisation fatigueContract lifecycle management2023-01-1110 minTech TransformedTech TransformedLow Code, No Code - Revolution or Evolution?Low code and no code are popular alternatives to traditional software development that limit the amount of coding needed in a bid to make working on applications quicker, easier and more accessible. Saving time, boosting efficiency and filling talent gaps are among the advantages of low code/no code, but what limitations could these practices provide? And what has contributed to the meteoric rise of this development philosophy?In this episode of the EM360 Podcast, Editor Matt Harris speaks to Chai Rajebahadur, Executive VP and Head of Europe at Zensar, to discuss: The acceleration of...2023-01-0409 minTech TransformedTech TransformedWhat We Can Expect to See in Cybersecurity in 2023The last few years have seen rapid changes in the cybersecurity landscape.From work-from-home cybersecurity becoming a key part of companies’ strategies to ransomware becoming an ever-present risk, cybersecurity has presented consistent challenges to the enterprise. But what does 2023 hold for the world of cybersecurity?In this episode of the EM360 Podcast, Editor Matt Harris speaks to Brad Laporte, an EM360-Partnered Analyst and advisor at Lionfish, to discuss:What happened in 2022, and what's to come in 2023?Increases in state-sponsored cyber attacks AI/ML playing a bigger role in cybersecurity2022-12-2118 minTech TransformedTech TransformedWhat a Cyber-Secure Smart City Looks LikeThe smart city. A modern, urban area where technology is intertwined with and relied on by the overall infrastructure.Traffic flow, footfall, healthcare, education; almost all aspects of our everyday lives can be affected and improved by the way city systems can collect data and use it for good. But what happens when the smart city becomes compromised?In this episode of the EM360 Podcast, Editor Matt Harris speaks to Aare Reintam, COO at CybExer Technologies, to discuss:Insecure smart cities and how disruptions could be catastrophicHow cybercriminals look to exploit specific v...2022-12-1414 minTech TransformedTech TransformedDriving Data Adoption and Empowering Data Teams to Fuel Company GrowthDriving data adoption. From prioritising BI and data-driven decisions to utilising powerful analytics tools, data adoption is key for businesses as they stay current in today’s market. According to a bi-survey.com report, the three biggest problems that enterprises face when tackling data adoption are a lack of analytical knowledge, a lack of technical knowledge and a lack of trust in data.In this episode of the EM360 Podcast, Editor Matt Harris speaks to Cindi Howson, Chief Data Strategy Officer at Thoughtspot, to discuss:Starting your analytics journeyModern data stacks and how they’ve evolv...2022-12-0718 minTech TransformedTech TransformedHow to Avoid Inheriting a Data Breach During a Merger/AcquisitionMergers and acquisitions. A practice the tech industry itself is certainly no stranger to, M&A’s happen all the time and mark the consolidation of companies. Companies can take on assets, share capital and equity interests; but they can inherit serious data risks too - and that’s a problem. In this episode of the EM360 Podcast, Editor Matt Harris speaks to Erwan Keraudy, CEO of CybelAngel, to discuss: Cyber due diligence during a M&AThe impact cyber risks have on recently merged companiesImproving security posture post-deal2022-11-2316 minTech TransformedTech TransformedIntermedia: Cloud Migration is the Key to Enterprise CommunicationsEnterprise communications consist of everything a company uses to connect its employees. Video meetings, instant messaging, dedicated phone extensions. It sounds trivial to the average employee in the post-COVID workplace, but really this stack of tools and practices can seriously impact how firms can collaborate, share, and perform as a well-oiled unit.In this episode of the EM360 Podcast, Analyst Jon Arnold speaks to Mark Sher, Senior VP of Product Marketing at Intermedia, to discuss:Cloud adoption in 2022Business value in UCaaS and CCaaSUncertainty in investing and using new technology2022-11-2329 minTech TransformedTech TransformedKeyfactor: Why You Need to Care About Machine IdentityMachine identity is an essential part of ensuring companies maintain a good level of data security and structural integrity. The management of digital certificates and keys allows all internal traffic to be encrypted, seriously narrowing the attack surface of an enterprise. In this episode of the EM360 Podcast, Editor Matt Harris speaks to Chris Hickman, Chief Security Officer at Keyfactor, to discuss:Where machine identity trends are headingWhy companies are paying more attention to machine identityIdentity as a single thread2022-11-2116 minThe Security StrategistThe Security StrategistKeyfactor: Why You Need to Care About Machine IdentityMachine identity is an essential part of ensuring companies maintain a good level of data security and structural integrity. The management of digital certificates and keys allows all internal traffic to be encrypted, seriously narrowing the attack surface of an enterprise. In this episode of the EM360 Podcast, Editor Matt Harris speaks to Chris Hickman, Chief Security Officer at Keyfactor, to discuss:Where machine identity trends are headingWhy companies are paying more attention to machine identityIdentity as a single thread2022-11-2116 minTech TransformedTech TransformedThe New EM360 Website: A Place to Publish, Learn and EarnToday's professional networking websites have devolved into the same reposting of social media nonsense.The content has strayed too far from what is relevant to you, your field and your development as an IT professional.And we're here to change that.Introducing the new EM360 website, a place to publish, learn and earn while growing your place in the enterprise tech world. In this very special episode of the EM360 Podcast, Editor Matt Harris joins EM360's Founder Michael Lodge and EM360's Head of Operations Ripon Deb to discuss:D...2022-11-1620 minTech TransformedTech TransformedRadware: Bot Mitigation is Key for Application ProtectionBot mitigation helps enterprises to identify and block unwanted bot traffic as it hits your network.And with half of all internet traffic coming from bots (both good ones and bad ones), managing that bot traffic is critical. Financial institutions, ticket-selling sites and shopping sites are among the hardest hit, with cybercriminals employing ML and AI in these bots to scale the size of their crimes and ambitions.In this episode of the EM360 Podcast, Analyst Richard Stiennon speaks to Uri Dorot, Senior Product Marketing Manager at Radware, to discuss:The world of ap...2022-11-1422 minThe Security StrategistThe Security StrategistRadware: Bot Mitigation is Key for Application ProtectionBot mitigation helps enterprises to identify and block unwanted bot traffic as it hits your network.And with half of all internet traffic coming from bots (both good ones and bad ones), managing that bot traffic is critical. Financial institutions, ticket-selling sites and shopping sites are among the hardest hit, with cybercriminals employing ML and AI in these bots to scale the size of their crimes and ambitions.In this episode of the EM360 Podcast, Analyst Richard Stiennon speaks to Uri Dorot, Senior Product Marketing Manager at Radware, to discuss:The world of ap...2022-11-1422 minTech TransformedTech TransformedThe Critical Role of ESM in Unlocking Seamless EXEnterprise service management, or ESM, is the concept of applying IT service management to other areas of the business, with the common goal to improve efficiency, performance and results.With employee experience becoming increasingly important in the midst of the great resignation, could ESM be the key to protecting your company?On this episode of the EM360 Podcast, Editor Matt Harris speaks to Martin Schirmer, President of Enterprise Service Management at IFS, about:Why EX is becoming a top priorityThe cost of bad EX and how to stop thisImplementing ESM within organisations2022-11-0914 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataSifflet: Observability and the Future of Data EngineeringData engineering is how companies design and build systems for collecting and using their data at scale.A critical practice as companies are pressured to make more and more data-driven decisions, data engineering is essential for enterprises to get ahead. In this episode of the EM360 Podcast, Editor Matt Harris speaks to Salma Bakouk, Co-Founder and CEO at Sifflet, to discuss;Trends shaping the data engineering industryCaring about data reliability and observabilityWhat the future brings2022-11-0322 minTech TransformedTech TransformedSifflet: Observability and the Future of Data EngineeringData engineering is how companies design and build systems for collecting and using their data at scale.A critical practice as companies are pressured to make more and more data-driven decisions, data engineering is essential for enterprises to get ahead. In this episode of the EM360 Podcast, Editor Matt Harris speaks to Salma Bakouk, Co-Founder and CEO at Sifflet, to discuss;Trends shaping the data engineering industryCaring about data reliability and observabilityWhat the future brings2022-11-0322 minTech TransformedTech TransformedMeet Lionfish Tech AdvisorsWho are Lionfish Tech Advisors?A team of premier IT Advisors, Lionfish comprises 25+ industry veterans who endeavour to advise some of the biggest firms on their tech stack and give them an essential competitive edge. Covering AI, Data, Cybersecurity and more, Lionfish boast hundreds of years of collective global advisor and analyst experience. In this episode of the EM360 Podcast, Editor Matt Harris meets Rob Smith, CEO of Lionfish Tech Advisors and Brad Laporte, industry veteran and advisor at Lionfish. Want to learn more? Head over to lionfishtechadvisors.com or visit the L...2022-11-0217 minTech TransformedTech TransformedEgnyte: Keeping Up With The Next Generation of Data PrivacyData privacy. The ever-changing landscape of collecting and sharing personal data is complex, with attitudes and regulations constantly being updated. So what’s happening in politics right now that could affect ¾ of the world’s data privacy rights? How are consumers reacting to all this? And why are customers struggling so much with compliance?In this episode of the EM360 Podcast, Editor Matt Harris speaks to Neil Jones, Director of Cybersecurity Evangelism at Egnyte, to discuss: Data privacy in US vs. UKHow current events affect companiesHow the landscape will look in 10 years' time2022-10-2719 minThe Security StrategistThe Security StrategistEgnyte: Keeping Up With The Next Generation of Data PrivacyData privacy. The ever-changing landscape of collecting and sharing personal data is complex, with attitudes and regulations constantly being updated. So what’s happening in politics right now that could affect ¾ of the world’s data privacy rights? How are consumers reacting to all this? And why are customers struggling so much with compliance?In this episode of the EM360 Podcast, Editor Matt Harris speaks to Neil Jones, Director of Cybersecurity Evangelism at Egnyte, to discuss: Data privacy in US vs. UKHow current events affect companiesHow the landscape will look in 10 years' time2022-10-2719 minTech TransformedTech TransformedFaaS and How to Think Like a CybercriminalFraud-as-a-Service, or FaaS, allows the offer of DDoS attacks, stolen data and social media passwords for sale, and all available with one single click. It can allow not only cybercriminals to monetise their illicit skills, but allows non-tech savvy criminals to carry out their own cyber crimes on a whim. In this episode of the EM360 Podcast, Editor Matt Harris speaks to James Brodhurst, Principal Consultant at Resistant AI, about:Fraud-as-a-serviceWhat security analysts need to look out forExamples of FaaS in action2022-10-2608 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataGenestack: Why Data Management is the Key to Success in Life SciencesData management is essential for the enterprise to get right, especially now as firms across all sectors are collecting and using vast amounts of data. But what exactly is good data management? Why do we need it? And what are some of the unacknowledged ramifications that have serious impacts on our day-to-day lives?In this episode of the EM360 Podcast, Analyst Doug Laney speaks to Misha Kapushesky, CEO at Genestack and Vivek Iyer, Team Lead, Human Genetics Informatics, from the Wellcome Institute, to discuss:What makes good data managementHow data impacts everyday lifeDriving behavioural and cult...2022-10-2423 minTech TransformedTech TransformedGenestack: Why Data Management is the Key to Success in Life SciencesData management is essential for the enterprise to get right, especially now as firms across all sectors are collecting and using vast amounts of data. But what exactly is good data management? Why do we need it? And what are some of the unacknowledged ramifications that have serious impacts on our day-to-day lives?In this episode of the EM360 Podcast, Analyst Doug Laney speaks to Misha Kapushesky, CEO at Genestack and Vivek Iyer, Team Lead from the Wellcome Institute, to discuss:What makes good data managementHow data impacts everyday lifeDriving behavioural and cultural change2022-10-2423 minTech TransformedTech TransformedManageEngine: Thinking Beyond ITSM and Achieving Enterprise AutomationIT service management, or ITSM, manages the delivery of IT services to employees and customers. A common misconception is that ITSM is basic IT support - but it’s so much more than that. Because, when done correctly, it can free up your enterprise to focus on essential automation. In this episode of the EM360 Podcast, Analyst Dr Eric Cole speaks to Prem Maheswaran, Product Manager at ManageEngine, to discuss:ITSMDemocratising IT in the pursuit of automationHow chatbots create space for business functions2022-10-2028 minTech TransformedTech TransformedThe Realm of Confidential ComputingConfidential computing is a cloud technology that isolates sensitive data in a protected CPU enclave as it's processed. Accessible only to authorised programming code, confidential computing helps protect private data and intellectual property while not worrying about the cloud as part of your attack surface. In this episode of the EM360 Podcast, Editor Matt Harris speaks to Ivar Wiersma, Head of Conclave, about:Confidential computing and its benefits compared to other data privacy technologyHow enclaves and trusted execution environments workWhy businesses need to care about this emerging technology2022-10-2013 minTech TransformedTech TransformedAvantra and Managecore: Using Hyperautomation to Help SAP Customers Grow Their BusinessHyperautomation is the business philosophy that the modern enterprise is using to rapidly automate SAP tasks and provide value back to the customer.A term coined by Gartner in 2019, hyperautomation and its rise are said to be indicative of how much RPA benefits businesses. In this episode of the EM360 Podcast, Editor Matt Harris welcomes John Appleby, CEO at Avantra, and Nick Miletich, CTO at ManageCore, to discuss:SAP Operation Automation and overcoming challengesThe importance of using hyperautomation for SAP CustomersHow Avantra’s hyperautomation platform improves, agility, reliability, and security of SAP Where hyperautomation should be on y...2022-10-1331 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataDatabricks: Building and Nurturing a Mature Data CultureData culture is becoming an increasingly important philosophy in the modern enterprise. Making data-driven decisions is critical to the success of a company in today’s world, and there really is no better way to do that than ensuring a data culture runs through the firm. There are plenty of studies that show a correlation between the maturity of a data culture and the success of a business, including this one from Collibra which states “Organisations with higher levels of maturity across their data culture are likely to realise higher business benefits and performance versus peer...2022-10-1310 minTech TransformedTech TransformedDatabricks: Building and Nurturing a Mature Data CultureData culture is becoming an increasingly important philosophy in the modern enterprise. Making data-driven decisions is critical to the success of a company in today’s world, and there really is no better way to do that than ensuring a data culture runs through the firm. There are plenty of studies that show a correlation between the maturity of a data culture and the success of a business, including this one from Collibra which states “Organisations with higher levels of maturity across their data culture are likely to realise higher business benefits and performance versus peers.”2022-10-1310 minMarTech Podcast ™ // Marketing + Technology = Business GrowthMarTech Podcast ™ // Marketing + Technology = Business GrowthB2B Influencers Impact on the Tech Industry -- Michael Lodge // EM360 TechMichael Lodge, CEO of EM360 Tech, talks about what's going on in B2B marketing. B2B is experiencing a rise in influencers, especially in the tech industry. These individuals are generally the ones that the IBMs, Bank of Americas, and Wells Fargos consult before implementing any technological solution, but they’re also the face of emerging B2B tech platforms. Today, Michael discusses the impact of B2B influencers on the tech industry. Show NotesConnect With: Michael Lodge: Website // LinkedInThe MarTech Podcast: Email // Newsletter // TwitterBenjamin Shapiro: Website // LinkedIn //  TwitterSee Privacy Policy at https://art19.com...2022-10-0611 minMarTech Podcast ™ // Marketing + Technology = Business GrowthMarTech Podcast ™ // Marketing + Technology = Business GrowthB2B Influencers Impact on the Tech Industry -- Michael Lodge // EM360 TechMichael Lodge, CEO of EM360 Tech, talks about what's going on in B2B marketing. B2B is experiencing a rise in influencers, especially in the tech industry. These individuals are generally the ones that the IBMs, Bank of Americas, and Wells Fargos consult before implementing any technological solution, but they’re also the face of emerging B2B tech platforms. Today, Michael discusses the impact of B2B influencers on the tech industry. Show NotesConnect With: Michael Lodge: Website // LinkedInThe MarTech Podcast: Email // Newsletter // TwitterBenjamin Shapiro: Website // LinkedIn //  TwitterSee Privacy Policy at https://art19.com...2022-10-0611 minTech TransformedTech TransformedBeyond Identity: Software Supply Chain Attacks and the Best DefenceA software supply chain attack is when someone infiltrates your system by attacking a third-party provider or partner with access to your data. Recent high-profile supply chain attacks, most notably SolarWinds, has this type of attack into the public eye, and it’s clear that with more suppliers handling sensitive data than ever before, the attack surface of a typical enterprise has been changed dramatically. In this episode of the EM360 Podcast, Analyst Richard Stiennon speaks to Suresh Bhandarkar, Director of Product Solution Architecture at Beyond Identity, to discuss:Software supply chain attacksWeaknesses in the CI/C...2022-10-0624 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataAnomalo: Beginning your Data Quality JourneyAs data continues becoming a core part of how businesses operate and make decisions, managing data quality has never been so important. Poor data quality can hit all enterprise levels hard, from marketers annoying prospects to supply chains becoming unable to automate processes properly.In this second episode of the three-part EM360 Podcast series with Anomalo on data quality, Elliot Shmukler, Co-Founder and CEO at Anomalo joins Analyst Christina Stathopoulos to discuss:The right time for data quality monitoringWhat happens if you wait too longWho should be involved2022-10-0628 minTech TransformedTech TransformedAnomalo: Beginning your Data Quality JourneyAs data continues becoming a core part of how businesses operate and make decisions, managing data quality has never been so important. Poor data quality can hit all enterprise levels hard, from marketers annoying prospects to supply chains becoming unable to automate processes properly.In this second episode of the three-part EM360 Podcast series with Anomalo on data quality, Elliot Shmukler, Co-Founder and CEO at Anomalo joins Analyst Christina Stathopoulos to discuss:The right time for data quality monitoringWhat happens if you wait too longWho should be involved2022-10-0628 minThe Security StrategistThe Security StrategistBeyond Identity: Software Supply Chain Attacks and the Best DefenceA software supply chain attack is when someone infiltrates your system by attacking a third-party provider or partner with access to your data. Recent high-profile supply chain attacks, most notably SolarWinds, has this type of attack into the public eye, and it’s clear that with more suppliers handling sensitive data than ever before, the attack surface of a typical enterprise has been changed dramatically. In this episode of the EM360 Podcast, Analyst Richard Stiennon speaks to Suresh Bhandarkar, Director of Product Solution Architecture at Beyond Identity, to discuss:Software supply chain attacksWeaknesses in the CI/C...2022-10-0624 minMarTech Podcast ™ // Marketing + Technology = Business GrowthMarTech Podcast ™ // Marketing + Technology = Business GrowthWhy Networking Site aren't Effective for MarTech -- Michael Lodge // EM360 TechMichael Lodge, CEO of EM360 Tech, talks about what's going on in B2B marketing. When LinkedIn launched, it was initially geared towards facilitating networking between professionals with similar business views and backgrounds. Fast forward to today and LinkedIn has moved away from its networking roots to become a social media platform. Today, Michael discusses why networking sites aren't effective for martech. Show NotesConnect With: Michael Lodge: Website // LinkedInThe MarTech Podcast: Email // Newsletter // TwitterBenjamin Shapiro: Website // LinkedIn //  TwitterSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not...2022-10-0515 minMarTech Podcast ™ // Marketing + Technology = Business GrowthMarTech Podcast ™ // Marketing + Technology = Business GrowthWhy Networking Site aren't Effective for MarTech -- Michael Lodge // EM360 TechMichael Lodge, CEO of EM360 Tech, talks about what's going on in B2B marketing. When LinkedIn launched, it was initially geared towards facilitating networking between professionals with similar business views and backgrounds. Fast forward to today and LinkedIn has moved away from its networking roots to become a social media platform. Today, Michael discusses why networking sites aren't effective for martech. Show NotesConnect With: Michael Lodge: Website // LinkedInThe MarTech Podcast: Email // Newsletter // TwitterBenjamin Shapiro: Website // LinkedIn //  TwitterSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not...2022-10-0515 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataSafe Software: Making the Impossible Possible Using Spatial DataSpatial data, also known as geospatial data, affects our everyday lives.A term used to describe data related to locations on Earth’s surface, spatial data can be used in everything from heat maps and political maps to smaller-scale indoor representations like in hospitals and offices. In this episode of the EM360 Podcast, Analyst John Santaferraro speaks to Todd Lewis, Founder and CEO of Spatial DNA, to discuss:Digital revolution and the challenges it’s producedHelping customers overcome complexity The future of spatial dataSpatial DNA is a partner of Safe Software.2022-10-0318 minTech TransformedTech TransformedSafe Software: Making the Impossible Possible Using Spatial DataSpatial data, also known as geospatial data, affects our everyday lives.A term used to describe data related to locations on Earth’s surface, spatial data can be used in everything from heat maps and political maps to smaller-scale indoor representations like in hospitals and offices. In this episode of the EM360 Podcast, Analyst John Santaferraro speaks to Todd Lewis, Founder and CEO of Spatial DNA, to discuss:Digital revolution and the challenges it’s producedHelping customers overcome complexity The future of spatial dataSpatial DNA is a partner of Safe Software.2022-10-0318 minThe Security StrategistThe Security StrategistThreatlocker: Stay Ahead of the Changing Attack Landscape using Zero TrustAs an IT Professional, you know that cyberattacks are ever-increasing, and businesses must do everything they can to ensure they remain protected. Organisations across the globe are beginning to implement Zero Trust solutions to protect their files, data, devices, and networks. Zero Trust is a concept that operates on the idea that nothing can be trusted, and everything is a threat until it has been properly verified. This process helps to mitigate and manage new and emerging cyber threats. In this episode of the EM360 Podcast, Editor Matt Harris welcomes Ben Jenkins, Director of Cybersecurity at Th...2022-09-2323 minThe Security StrategistThe Security StrategistOmada: The Pitfalls of IGA DeploymentsIdentity Governance and Administration (IGA) systems are a fundamental part of an enterprises identity and access management strategy. For companies that need functionalities like role-based access and automated approval, IGA systems can be essential in ensuring that the right people are getting access to the right things. Sounds easy enough, but issues with adoption, sponsorship and employee access speak to the fact that plenty of things can derail a deployment. In this episode of the EM360 Podcast, Analyst Richard Stiennon speaks to Rod Simmons, VP of Product Strategy at Omada, about:Automating already...2022-09-2325 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataAnomalo: Why Data Quality Monitoring is EssentialData quality monitoring is a process that manages and ensures high-standard data within an organisation. Performed through strategies like automation and full-stack monitoring, companies set their own data quality metrics and KPIs to measure and evaluate it.  In this episode of the EM360 Podcast, Analyst Christina Stathopoulos speaks to Jeremy Stanley, Co-founder and CTO of Anomalo, to discuss:Data quality monitoring in a data reliant marketUsing unsupervised MLChanges in the last 5 years2022-09-1632 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataOrion Governance: Data Governance for the Digital AgeData governance in the modern world is the managing, utilising and securing of data in enterprise systems, and it’s becoming increasingly more important as organisations face new data privacy regulations as well as the need to make data-driven decisions.Well-designed data governance programs often include governance teams, steering committees and data stewards. But behind these lie data standards, policies and philosophies that can help businesses handle astounding amounts of data in the right way. In this episode of the EM360 Podcast, Analyst Christina Stathopoulos speaks to Ramesh Shurma, Founder and CEO at Orion Governance, to...2022-09-1426 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataInformatica: The Journey to Cloud ModernizationCloud modernization transforms organizations and enables continuous innovation.A cloud modernization program accelerates your analytics initiatives to gain the agility, speed, and scale needed to drive business value and deliver a competitive advantage. Informatica has enabled many leading customers to move their on-premises workloads to the cloud seamlessly and to innovate at scale. Learn how Informatica’s Cloud Modernization Program has allowed customers to streamline processes, improve data delivery, and accelerate time to insights while reducing migration costs and mitigating risk with minimum disruption to ongoing business operations.On this episode of the EM360 Podcast, Anal...2022-09-0721 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataIncorta: Raw Data and the Art of Real-time AnalyticsRaw data is data that has not yet been processed for practical use. It, of course, has the potential to become real and actionable information - but the transformation requires selective extraction, organisation and formatting.Businesses today are really beginning to recognise the value of raw data. With consumer data being one of the hottest commodities of the 21st century, the ability to make more informed decisions is driving the enterprise to make this unprocessed data work for them.In this episode of the EM360 Podcast, Analyst John Santaferraro speaks to Nick Jewell, Seni...2022-08-2518 minTech TransformedTech TransformedThe Future of Work in the Racing IndustryNetworking technology giant Cisco has this year expanded its partnership with McLaren Racing, providing collaboration infrastructure to enhance the F1 team’s speed, scale and power across their stack. McLaren Racing was founded by New Zealand racing driver Bruce McLaren in 1963, and with more than 180 F1 Grand Prix wins under their belt, they are one of the most iconic motorsport brands in the world.They now use Cisco’s solutions across their enterprise, upgrading their offices as well as their on-site race day deployments. EM360 visited the team’s headquarters in Surrey - the McLa...2022-08-2409 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataBrytlyt: Data Discovery and the Next Generation of Business IntelligenceData discovery is a subset of business intelligence (BI), referring to the collecting and consolidating of data from multiple databases into a single source. This makes it much easier to investigate and detect patterns, as well as apply real-time data controls to ensure safe storage and analysis.In this third episode of the three-part EM360 Podcast, Analyst Christina Stathopoulos is joined by Richard Heyns, Founder and CEO of Brytlyt, to discuss:Scaling analytics speedHow to optimise the processing of geospatial dataThe next generation of BI2022-08-1922 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataSafe Software: How Location Intelligence Powers Real-Time DecisionsLocation Intelligence (LI) is how we use data to answer spacial questions. It goes beyond visualising data on a map - in fact, the analysis of location data has become integral to our daily lives.From 5G network deployments and geomarketing to Dominos Pizza understanding where you are and what you’re likely to order as soon as they pick up the phone, it’s clear that every sector is adopting LI to strengthen their processes.In this episode of the EM360 Podcast, Ciaran Kirk, Operations Director at IMGS joins Analyst John Santaferraro to discuss Loca...2022-08-1625 minThe Security StrategistThe Security StrategistHID Global: Why Authentication is Still Such an IssueAuthentication is the art of determining whether something is what it says it is. Passwords provide a great way for customers and consumers to access their personal information but when it comes to the enterprise, newer concepts like two-factor authentication (2FA) and zero trust network access (ZTNA) may be required. It’s been part of computing since its inception two decades ago - yet IT teams and businesses are still putting a lot of time into it.So why is authentication still such an issue?In this episode of the EM360 Podc...2022-08-0217 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataBrytlyt: Making Deep Learning Available to Data ScientistsDeep learning is a subgenre of machine learning and AI that mimics human behaviour - lending itself to predictive modelling and statistics. But how can we take the power of deep learning and make it more accessible to the citizen data scientist?In this episode of the EM360 Podcast, Analyst Christina Stathopoulos speaks to Richard Heyns, Founder and CEO of Brytlyt, about:Deep learning and artificial neural network systemsDL vs MLEmbedding AI into the database2022-07-1223 minThe Security StrategistThe Security StrategistCensys: The World of Attack Surface ManagementAttack surface management is the sustained monitoring, classifying, and inventory of a businesses IT infrastructure.It sounds as simple as asset management, but ASM is different in the way it approaches these responsibilities from an attacker’s perspective.The security of an enterprise's surface is paramount in the current era of cloud - but how can companies manage their cloud security posture management and tackle basic misconfigurations?In this episode of the EM360 Podcast, Chief Research Analyst at IT-Harvest Richard Stiennon speaks to David SooHoo, Director of Product Management at Censys, as the pa...2022-05-3018 minThe Security StrategistThe Security StrategistCalamu: The Next Generation of Data ProtectionBusinesses today are under increasing pressure to level up data security as ransomware and data theft continue to rise. Data-first security solutions provide businesses with next-generation protection against exfiltration while maintaining accessibility for day-to-day operations, even during an attack.In this episode of the EM360 Podcast, Dr. Eric Cole, CEO and Founder at Secure Anchor Consulting speaks to Paul Lewis, CEO of Calamu, about:Today’s biggest threats to dataThe problem of data exfiltrationHow a data-first security approach provides next-generation protection2022-05-2726 minThe Security StrategistThe Security StrategistDarktrace: The Fast and Furious Nature of CybersecurityThe Nature of Cybersecurity is undergoing rapid evolution. Cyber attacks are becoming more violent - and sophisticated. Big developments in tech over the last few years have led to some of the most shocking ransomware incidents.Are IT teams capable of keeping up, or are we leading towards cyber doomsday?In this episode of the EM360 podcast, Chief Research Analyst at IT-Harvest, Richard Stiennon speaks to Mariana Periera, Director of Email Security Products at Darktrace, to explore:How businesses can come back stronger following a threatThe email supply chain and how attackers are using...2022-05-1917 minThe Security StrategistThe Security StrategistRapid7: How to Swiftly Respond to Modern Cyber ThreatsIn 2021, more than half of all widespread threats began with a zero-day exploit that was targetted by threat actors before vendors could even make patches available. With security teams now being put under immense pressure, what can organisations do to help secure their online presence against modern cyber threats?In this episode of the EM360 podcast, Content Producer Matt Harris talks to Caitlin Condon, Vulnerability Research Manager at Rapid7, as they explore: How security teams can respond to threats more swiftly and effectivelyRemote working’s effect on company weakpointsHow enterprises can better understand and reme...2022-05-1816 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataFindability Sciences: Adopting the Power of AIArtificial intelligence. The catch-all term defines the machines that can mimic and display sentient cognitive skills such as learning and problem-solving. A key part of modern technology, the advancements of AI indicate just how far the human race has come. AI can be used by businesses to interpret and use massive volumes of data.In this third episode of a three-part EM360 podcast series with Findability Sciences, Data Whisperer and Analytics Expert, Christina Stathopoulos speaks to the company’s Founder and CEO Anand Mahurkar, as the pair explore:Getting the most out of wide da...2022-05-1223 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataSafe Software: Digital Twins and Their Role Within the Data SpaceDigital twins are virtual models designed to accurately reflect a physical object or process. The real-world applications of this are endless - from city planning to construction and decoration, digital twins can help you visualise concepts within spaces with ease. When it comes to processes a digital twin can represent measurements of flows that are difficult to show such as wind direction, or temperature of flows within pipes. What’s more, the twinned object can be outfitted with sensors and produce performance data that can be applied to the digital copy. This offers a valuable insight into ho...2022-05-0422 minThe Security StrategistThe Security StrategistCyberGRX: Cyber Risk Intelligence and the Meaning of a True Risk ExchangeCyber risk intelligence is critical for businesses that operate in the digital world. It is the collection, evaluation, and analysis of cyber threat information by those with access to all-source information. Like other areas of important business intelligence, cyber threat intelligence is qualitative information put into action to help develop security strategies and aid in identifying threats and opportunities. In the episode of the EM360 podcast, Richard Stiennon, Chief Research Analyst at IT-Harvest, speaks to Caitlin Gruenberg Director, Risk Solutions Engineer at CyberGRX as the pair explore: Third-party cyber risk management vs self-assessmentsCyber risk...2022-05-0316 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataStreamSets: How to set up your data democratisation strategyData democratisation is the continuous process of enabling company-wide access to data, regardless of technical know-how, in a bid to spread a data-led decision-making mindset across all departments of an organisation. It can be a big challenge - and serious investment - for companies as employee education and tool implementation is not trivial undertakings. How can companies set up their data democratisation strategy?In this episode of the EM360 podcast, Content Producer Matt Harris talks to Giuseppe Mura, Director of Solution Engineering at StreamSets, as they tackle:The steps companies should utilise...2022-04-2128 minThe Security StrategistThe Security StrategistBeyond Identity: CIAMs and Hitting a Balance Between Security and Customer FrictionCIAM enables organisations to securely capture and manage customer identity and profile data, as well as control customer access to certain applications and services. Usually providing a variety of features including customer registration, self-service account management, and 2FA/MFA, the best CIAM solutions ensure a secure and seamless customer experience. But how can enterprises hit a balance between security and customer friction?In the first of two EM360 analyst podcasts with Beyond Identity, Chief Research Analyst at IT-Harvest, Richard Stiennon speaks to Jing Gu, Senior Product Marketing Manager, about the role CIAMs play...2022-04-1324 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataS6S11: How the Data-Driven Revolution is Impacting CX with ActionIQThe data-driven revolution has enabled brands to achieve true customer centricity — but only if they have the right data analysis and experience orchestration capabilities. Whether creating a single customer view, generating predictive insights, or orchestrating seamless omnichannel experiences, organisations must work to make sure their customer data is accurate, accessible, and actionable.The data-driven revolution is transforming the customer experienceHosting this episode of the EM360 Podcast is Susan Walsh, Founder, and MD of The Classification Guru. Joining her is the Head of Martech Strategy at ActionIQ, James Meyers, who will be sharing hi...2022-04-0130 minThe Security StrategistThe Security StrategistIntercepting Attackers with Deceptive TechnologyYear on year, cybercriminals are expanding their attack toolkits and coming up with different ways to cause disruption across the enterprise. However, according to cybersecurity experts, deceptive technology can be used to effectively intercept these crimes. Investigating this destructive attack vector in this week's episode of the Next Phase of Cybersecurity is Carolyn Crandall, Chief Security Advocate at Attivo Networks. Carolyn was first featured on the EM360 Podcast to talk about deception technology and its ability to turn the table on attackers. This time, she is here to set out how to disrupt attackers' toolkits and ultimately render...2021-11-0327 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataTraining Skilled Professionals: Inclusivity in STEMHybrid working has become a common talking point of many organisations in the last year as the increase of remote working has transformed several industries. As one might expect, a change in our work culture drastically changes the demands of our workers, meaning that more skilled professionals are required to handle independent working. The problem is that in its current state, the UK is underprepared for this paradigm shift; according to Coursera's Global Skills Report, the UK has the lowest proficiency for business skills in Europe, ranking only at a 29% proficiency. There is hope for the UK yet...2021-07-0724 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataS4E9: The Power of an Analytics Operating SystemAs businesses endeavour to effectively action their data, business intelligence (BI) software and analytics operating systems have become all the more important and cherished. Not only do BI software fulfil their purpose of helping companies attain useful business insights, but they can also support flexibility and strengthen governance.Joining Ronald van Loon and EM360 to lend his BI expertise is Ian Macdonald, Principal Technologist at Pyramid Analytics. Firstly, Ian gives a comprehensive introduction to analytics operating systems, before giving an overview of the BI market. He also delves into the improved work capabilities that BI provides to b...2020-09-0137 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataS3E1: Architecting Big Data Across the EnterpriseKickstarting our third series of Data Transforming Business, EM360’s David Argent met with Nick Curcuru, formerly at Mastercard, and Matt Maccaux, formerly at Dell EMC, to talk big data. In this episode, our speakers go back to basics, starting by exploring where the term ‘big data’ came from. As well as this, they strip back any confusion surrounding big data and tell us what it means fundamentally. For information regarding your data privacy, visit acast.com/privacy2019-09-0330 min