Look for any podcast host, guest or anyone
Showing episodes and shows of

EM360Tech

Shows

Tech TransformedTech TransformedWhat Does the Future of CX Look Like with Agentic AI?"As agentic AI spreads across industries,” states Rishi Rana, the Chief Executive Officer at Cyara. “Everybody is curious to understand how that is going to transform customer experience across all the channels?"In this episode of the Tech Transformed podcast, Shubhangi Dua, the Host and Podcast Producer at EM360Tech, talks with Rishi Rana, the CEO of Cyara, about how agentic AI is changing customer experience (CX). They look at how AI has developed from simple chatbots to advanced systems that can understand and predict customer needs. Rana spotlights the need for ongoing testing and monitori...2025-08-0723 minTech TransformedTech TransformedWhy an Agentic Data Management Platform is the Next Generation Data StackEnterprise data management is undergoing a fundamental transformation. The traditional data stack built on rigid pipelines, static workflows, and human-led interventions is reaching its breaking point. As data volume, velocity, and variety continue to explode, a new approach is taking shape: agentic data management.In this episode of Tech Transformed, EM360Tech’s Trisha Pillay sits down with Jay Mishra, Chief Product and Technology Officer at Astera, to explore why agentic systems powered by autonomous AI agents, Large Language Models (LLMs), and semantic search are rapidly being recognised as the next generation of enterprise data architecture.The c...2025-07-1523 minTech TransformedTech TransformedAre AI Agents the Future of Developer Productivity in the Enterprise?"There's a lot of hype with the AI agents and their productivity and potential outcomes. AI Agents are quite amazing, says Eric Paulsen, EMEA Field CTO at Coder.In this episode of the Tech Transformed podcast, Shubhangi Dua, Podcast Host and Producer at EM360Tech, talks to Paulsen about the constantly advancing role of AI agents in development environments. Paulsen explains how AI agents can help developers by handling simpler tasks, almost like having assistants or junior developers to assist them. Not only would this boost productivity and time efficiency, but the technology will also en...2025-07-1020 minTech TransformedTech TransformedThe Death of Expertise: What AI Won’t Teach UsAre we heading for a future where AI knows everything but won’t bother explaining it to us?Advancements in artificial intelligence are rapidly transforming the way industries operate and influencing the future of society as a whole. AI has become a force behind breakthrough technologies such as big data analytics, robotics, and the Internet of Things (IoT). The rise of generative AI has only accelerated its adoption and broadened its impact across multiple sectors. Navigating the Displacement DilemmaIn this episode of Tech Transformed, host Trisha Pillay at EM360Tech sits down with...2025-07-0923 minTech TransformedTech TransformedWho Speaks for the Algorithm? The Emerging Role of the AI AnalystTakeaways#AI #analysts are crucial for integrating AI into business processes.Organisations need to rethink their data management strategies for AI.AI #data clearinghouse concepts help manage data access and security.Cross-functional collaboration is essential for successful AI integration.AI can enhance employee effectiveness rather than replace jobs.The future of work will see AI analysts in various business functions.Companies must adapt quickly to remain competitive in the AI landscape.SummaryThis episode of the #TechTransformedPodcast explores the role of AI Analysts. Host Keyari Page is joined by guest speaker Andy MacMillan, CEO...2025-05-2330 minTech TransformedTech TransformedCan AI Eliminate IT Tickets? Exploring the Future of Automated IT"The concept of Zero Ticket IT is that instead of reacting to the ticket and trying to solve the ticket, you go directly to the source of the issue." This statement by Sean Heuer, CEO of Resolve Systems, sets the stage for this episode of the Tech Transformed podcast.Shubhangi Dua, podcast host and producer at EM360Tech, , sits down with Heuer to unpack the ambitious yet achievable vision of Zero Ticket IT and how both agentic AI and intelligent automation are poised to change IT operations.Traditional IT ticketing systems, with their reactive nature and re...2025-05-2235 minThe Security StrategistThe Security StrategistIs Your Current Security Strategy Enough to Stop Sophisticated Cybersecurity Attacks?“The types of attacks that we're seeing today are malicious in nature. They go to the very heart of the functioning of businesses,” stated Brett Ley, VP, Global Technical Sales at A10 Networks.This observation from Ley sets the stage for a crucial discussion on The Security Strategist podcast. Shubhangi Dua, podcast producer and Tech journalist at EM360Tech sits down to talk about the critical need for a strong and unified approach to safeguarding digital assets against threats like DDoS attacks.Expanding on the pervasive nature of these threats, Ley emphatically agrees that no organisati...2025-05-2130 minTech TransformedTech TransformedCan Old Hardware Run New AI? How Businesses Can Make Current Hardware Future-ForwardAre you a CIO, CTO, CISO, or IT decision maker in the restaurant or retail industry, grappling with rising costs and tariffs to keep up with the rapid pace of technological change? The pressure to create high-quality solutions with AI while managing existing infrastructure can be challenging.In this episode of the Tech Transformed Podcast, Shubhangi Dua, podcast host and producer at EM360Tech sits down with Keith Szot, SVP Chief Evangelist at Esper, to talk about how enterprises can extend the lifespan of their current edge devices. They also discuss how such enterprises can easily integrate Edge...2025-05-2136 minTech TransformedTech TransformedCan AI Agents Help You Achieve Data Trust and Compliance?The ability to effectively manage and optimise data is key in an organisation today. But with the sheer volume and complexity of enterprise data, traditional methods are struggling to keep up with the change. This is where the agentic AI approach has swooped in to transform how organisations handle their most valuable resource. "The promise of AI and agentic AI is that we're now building very meaningful automation into the platform such that these teams of 10 are now able to basically actually capture all of the metadata about all of the data cataloged across their entire company," sta...2025-05-1926 minThe Security StrategistThe Security StrategistThe Never-Ending Chess Game in Personnel SecurityTakeaways#Personnelsecurity is crucial for organisations and individuals.There is a significant talent shortage in the #cybersecurityindustry.#AI can enhance security measures but cannot replace human instinct.Outsourcing security functions can be beneficial for smaller organisations.The pressure on cybersecurity roles is immense and can lead to high turnover.AI will play a larger role in automating security responses in the future.Understanding the risks of outsourcing versus insourcing is vital for businesses.On this episode of #TheSecurityStrategist, host Keyari Page welcomes Tony King, Senior Vice President of International Sales at NETSCOUT. They discuss what personnel...2025-05-1627 minThe Security StrategistThe Security StrategistBeyond The App Store: Cloud Marketplace SecurityTakeaways#Cloudmarketplaces function like a digital mall for various services.Continuous monitoring and detection of threats are essential.Legislation like NIST 2 and Dora impacts cloud security practices.Zero trust methodology is advised in securing cloud connections.Regular penetration testing and vulnerability management are necessary.Data strategy is key when implementing #AI in cloud services.Centralising identity management can limit security risks.SummaryOn the #SecurityStrategistpodcast, host Keyari Page delves into the dynamic world of cloud marketplace ecosystems with Mostyn Thomas, Senior Director of Security at Pax8. Listeners can gain a comprehensive understanding o...2025-05-1627 minThe Security StrategistThe Security StrategistData Backups: The Digital Safety Deposit BoxTakeaways#Databackups are essential for business continuity.The 3-2-1 backup #strategy is crucial for data protection.Testing backup systems is necessary to ensure data recovery.Businesses should back up all critical data sets.#AI can assist in data classification for backups.Avoid keeping backups in the same location as primary data.Understanding when data became corrupted is vital for recovery.SummaryJoin host Keyari Page as she welcomes Jon Fielding, Managing Director of Apricorn to discuss data backups. They break down the basics of what data backups are and explain why t...2025-05-1520 minThe Security StrategistThe Security StrategistDDoS Demystified: Understanding the ThreatTakeaways#DDoS can mimic legitimate traffic, making detection difficult.#Botnets are often created from compromised IoT devices.Motivations for DDoS attacks range from hacktivism to personal grievances.Residential IP proxy networks complicate DDoS defense.#AI is increasingly being used in both attacks and defenses.The future of cybersecurity will require AI-assisted solutions.Organisations must understand their traffic to defend effectively.SummaryIn this episode of The Security Strategist podcast, host Keyari Page leads an engaging conversation with David Warburton, Director of Threat Research at F5 Labs, focusing on Distributed Denial of Service (DDoS) attacks.2025-05-1524 minTech TransformedTech TransformedCan Open Source Ensure AI Works For Everyone, Not Just The Largest Enterprises?“Before starting a new AI project, it is really worthwhile defining the business priority first,” asserts Joanna Hodgson, the UK and Ireland regional leader at Red Hat.“What specific problem are you trying to solve with AI? Do we need a general purpose AI application or would a more focused model be better? How will we manage security, compliance and governance of that model? This process can help to reveal where AI adoption makes sense and where it doesn't," she added. In this episode of the Tech Transformed podcast, host Shubhangi Dua, podcast producer at EM360Tech ...2025-05-1232 minTech TransformedTech TransformedAre Your Field Teams Disaster Ready and Safe?Takeaways#Satellitecommunications are essential for remote field teams.They provide safety and tracking for workers in isolated areas.Disaster preparedness involves proactive planning and communication.User-friendly #technology is crucial for effective utilisation.Reliable communication impacts day-to-day operations positively.Employers show care for employee safety through #satellitetechnology investment.SummaryIn this episode of #TechTransformed, Jonathan Care discusses the importance of satellite communications for field teams. He is joined by Mark O'Connell, EMEA & Asia Pacific General Manager at Globalstar, and Grace Finn, Senior Account Manager at Peoplesafe. Together, they explore how satellite technology enhances safety, disaster...2025-05-0619 minThe Security StrategistThe Security StrategistCan You Afford to Ignore Exploitability?Takeaways#ExposureManagement involves assessing multiple factors, not just single scans.Organisations must optimise their remediation capacity due to limited resources.Visibility is crucial, but finding the most important exposure is essential.#TraditionalVulnerability management programs are becoming ineffective.Exploitability is the key criterion for prioritising remediation efforts.Automated scanning can provide rapid insights into vulnerabilities.Time taken to remediate is critical for effective security management. SummaryIn this episode of the Security Strategist, Richard Stiennon, Chief Research Analyst at IT Harvest and industry leader, speaks with Marc Gaffan, the CEO of IONIX. They...2025-04-3019 minTech TransformedTech TransformedAI Agents: The Rise of the AutonomousTakeaways#AIagents are #autonomous entities that can perceive and act.Human oversight is essential in the initial stages of AI implementation.Data quality and trust are critical for effective AI agents.Guardrails must be integrated into the design of AI agents.Modularity in design allows for flexibility and adaptability.#AI should be embedded in data management processes.Collaboration between data and application teams is vital.SummaryIn this episode of #TechTransformed, Kevin Petrie, VP of Research at BARC, and Ann Maya, EMEA CTO at Boomi, discuss the transformative potential of AI agents and intelligent...2025-04-2827 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataLeading Up to The Peak: Can Data Integration Solve Key Enterprise Challenges?In this episode of the Don't Panic, It's Just Data podcast, hosted by EM360Tech's podcast producer, Shubhangi Dua speaks to Donnie Owsley from Snohomish County, and Jeff Burton and Tom Lavery from the University of British Columbia. All of the speakers will be presenting at the upcoming Peak of Data and AI event, organised by Safe Software, the creators of FME. Scheduled to take place in Seattle from May 5th to 8th, 2025, The Peak is an exciting gathering for data and AI innovators. This conversation offers a preview of some of the practical applications and insights that...2025-04-2810 minThe Security StrategistThe Security StrategistFrom Peacetime to Wartime: Is Your Cloud Secure?Takeaways#Peacetimesecurity is no longer sufficient in modern cloud environments.AI and automation are essential for effective security management.Real-time security platforms can prevent breaches before they occur.Integrating security into the development process is crucial for success.Key metrics include mean time to detect and remediate vulnerabilities.A unified #dataarchitecture is vital for effective security operations.Automation can significantly reduce analyst workload and alert fatigue.Organisations should evaluate vendors based on their ability to adapt to evolving threats.SummaryIs your organisation still relying on outdated “peacetime” security solution strategies in the face of r...2025-04-2832 minThe Security StrategistThe Security StrategistHow to Streamline IT Operations and Enhance Security with RMM and AutomationRemote Monitoring and Management (RMM) solutions are quite ambitious, promising to identify the issues before they have a chance to impact your IT operations. “A good RMM offers a combination of tools for you to do this properly,” stated Elias Moura, the Head of Product Marketing at Pulseway. “You have automation to enable auto-remediation, built-in remote control, automated patching, mobile device management, and other features that make RMM an effective tool,” he added. “The RMM is usually the central piece to make sure that IT management is consistent and tackling different issues that your end user could face.” I...2025-04-2437 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataIs Your Finance Team Stuck in the Past? Real-Time AnswersTakeaways#Financeteams are often resistant to change, clinging to outdated tools.Real-time data integration can help break down data silos and better decision-making.The shift from FP&A to XP&A emphasises collaboration across departments.#Datagovernance is crucial when handling financial data.Real-time data enables more accurate forecasting and budgeting.Organisations should define their data strategy before implementation.Proactive adaptation to data technologies is essential for future success.SummaryIn this episode of "Don't Panic, It's Just Data," host Christina Stathopoulos explores the world of real-time analytics and its impact on financial decision-making. She...2025-04-2327 minTech TransformedTech TransformedCustomer Success: Your Revenue Compass in the AI StormTakeaways#Customersuccess is about helping customers get value from products.The perception of customer success is shifting from a cost centre to a revenue generator.#AI can enhance customer success by providing predictive insights and automating processes.Customer success teams are uniquely positioned to identify upsell and cross-sell opportunities.Collaboration between customer success and sales teams is essential for maximising revenue.The integration of AI tools can streamline customer success operations.SummaryEver wonder how to transform existing customers into your company’s most powerful growth engine? According to Gainsight’s Chief Revenue Officer, Mari...2025-04-2219 minTech TransformedTech TransformedAre You Ready for the Rise of Agentic AI Workforce?Takeaways#AgenticAI systems can string tasks together for efficiency.Real-world applications include supply chain optimisation and knowledge worker augmentation.#Dataquality is crucial for effective AI implementation.Education and understanding of AI's potential are essential for organisations.Governance is key to ethical AI deployment.Leadership is critical in adopting AI technologies.AI will create new job opportunities, not just displace existing ones.SummaryJeff DeVerter, Field Chief Technology Officer at Pythian, describes agentic AI as “little workers that are going to go off and all do a job. You're now a manager of these AIs th...2025-04-1424 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataWhy is a Customer Data Strategy a Competitive Edge?Takeaways#CMDM is essential for creating a unified and accurate view of the customer. Trust comes from how responsibly data is handled.Ethical data use is a competitive advantage and builds trust.Executive sponsorship and cross team buy-in is crucial for MDM projects.A strong customer #datastrategy is a competitive edge, not a side project. SummaryCustomer Master Data Management (CMDM) as Matthew Cawsey, Director of Product Marketing at Stibo Systems describes, "about having a master record of a customer, as opposed to many organisations where customer data gets created and authored in potentially d...2025-04-1130 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataThe Future of Data Centres EnergyThe digital age is fueled by data, and the engines powering that data are data centres. However, this growth comes at a significant energy cost. In the latest episode of the EM360Tech Don’t Panic It’s Just Data podcast, Shubhangi Dua speaks with Rolf Bienert, Technical & Managing Director of the OpenADR Alliance, to shed light on the urgent need for sustainable energy practices within the data centres industry. In this episode, we discuss the stark reality of escalating energy consumption, driven by factors like the rise of AI, and the critical importance of moving beyond super...2025-03-0535 minTech TransformedTech TransformedReal-Time AI: The Next Evolution of Enterprise IntelligenceThe world is changing faster than ever. Businesses are drowning in data, yet struggling to extract the insights they need to stay ahead. Artificial intelligence (AI) holds the key, but traditional AI models are too slow, too static, and too disconnected from the real world. This is where real-time AI comes in. Real-time AI empowers businesses to make decisions in milliseconds, reacting to changing conditions and seizing fleeting opportunities. It's about more than just analysing historical data; it's about understanding the present and predicting the future, all in the blink of an eye.Imagine a w...2025-02-2126 minThe Security StrategistThe Security StrategistThe Evolving Cyber Threat Space: A Geopolitical PerspectiveIn today's deeply connected world, cybersecurity is no longer just a technical issue—it's deeply intertwined with geopolitics. This episode explores this complex relationship, talking about the ever-shifting threat space and examining how international regulations and geopolitical tensions impact organisations' cybersecurity posture. The episode also discusses the double-edged sword of artificial intelligence in cybersecurity, acknowledging its potential to enhance defenses while also requiring skilled personnel to effectively leverage its capabilities. It further spotlights that achieving zero risk in cybersecurity is an unrealistic goal, and enterprises must focus on building strong risk management frameworks and selecting the...2025-02-2028 minTech TransformedTech TransformedCode Less, Build More: The AI future of Low-Code DevelopmentAI is catalysing the evolution of low-code platforms and reshaping the landscape of low-code development tools. These new technologies can provide a strategic advantage in streamlining internal operations. By leveraging AI effectively organisations are able to deliver truly personalised, adaptive, and intuitive interactions.However, organizations face challenges adopting these new technologies and risks like AI hallucinations need to be mitigated to ensure reliable outcomes.In this episode, Paulina Rios-Maya, Head of Industry Relations at EM360Tech, speaks with Nikhil Nandagopal, Co-founder and CPO of Appsmith, about the transformative impact of AI on...2025-01-0228 minTech TransformedTech TransformedThe AI Summit New York: What to ExpectIn this episode, Paulina Rios Maya, Head of Industry Relations at EM360, speaks with Caroline Hicks, Senior Event Director of the AI Summit Global Series, about the upcoming AI Summit New York, which will take place December 11-12, 2024. They discuss the event's focus on AI's practical applications across various sectors, the importance of ethical considerations in AI, and the collaborative efforts among different industries to harness AI technology responsibly. The conversation highlights key discussions and innovations that will be showcased at the summit, emphasizing the transformative impact of AI on businesses and societyRe...2024-12-0309 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataDoubleCloud: Mastering Real-Time Data with Open-SourceOpen source technologies are transforming how businesses manage real-time data on cloud platforms. By leveraging flexible, scalable, and cost-effective open-source tools, organisations can process and analyse large volumes of data with speed and precision. These technologies offer unmatched transparency, customisation, and community-driven innovation, making them ideal for real-time monitoring, analytics, and IoT applications.As data demands grow, open-source solutions ensure that businesses stay agile, reduce vendor lock-in, and maintain full control over their cloud infrastructure. The result? Faster insights, smarter decision-making, and enhanced performance—all powered by open source. In this episode, Paulina Rios Maya, Hea...2024-09-1617 minThe Security StrategistThe Security StrategistHow is Proactive CDR Revolutionising Cloud SecurityAs cloud adoption accelerates, the demand for effective cloud threat detection solutions is snowballing. Organisations face increasing challenges in securing their cloud environments due to the complexity of modern infrastructures and cyber threats. Traditional security measures often fail to identify and respond to sophisticated cloud-based attacks, leaving businesses vulnerable to breaches, data loss, and service disruptions.Skyhawk addresses these challenges with its cutting-edge autonomous purple team approach. By combining AI-based red teaming with continuous detection and response capabilities, Skyhawk’s solution proactively identifies and mitigates cloud threats before they cause harm. This advanced strategy ensures that organisations ca...2024-09-1616 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataWhat to Expect from Big Data LDN 2024Big Data LDN 2024, the UK’s leading data, analytics, and AI event, is less than a week away – promising two days filled with ground-breaking stories, expert insights, and endless innovation.Taking place at the Kensington Olympia in London on September 18-19, this year’s event features fifteen theatres and over 300 expert speakers sharing insights on some of the industry’s hottest topics – from generative AI to data analytics and privacy. With the event less than a week away, EM360Tech’s Head of Podcast Production, Paulina Rios Maya, grabbed Big Data LDN’s Event Director, Andy Steed, for...2024-09-1109 minThe Security StrategistThe Security StrategistDefend Like a Pro: Comprehensive Threat Detection & Response with Proactive Risk ManagementCritical Start's Managed Detection and Response (MDR) service is designed to provide24x7x365 monitoring, human-driven threat investigation, and flexible deployment acrossIT and OT environments.By leveraging deep technical expertise, robust API integrations, and contractual SLAs,they offer comprehensive protection against evolving cyber threats.Critical Start tackles attack vectors such as phishing, brute force attacks, andvulnerability exploitation by combining advanced threat detection & response, incidentresponse, and proactive risk management.These capabilities empower organizations to continuously map, monitor, and mitigate...2024-09-1118 minTech TransformedTech TransformedThe Growth of Enterprise Tech PodcastingPodcasts have become a valuable tool for sharing knowledge on topics like cybersecurity, AI, data management, and infrastructure. EM360Tech took it even further with their expertly curated content and engaging discussions featuring industry leaders and experts.Michael Lodge, founder and CEO of EM360Tech, shares his valuable insights on the evolution of enterprise tech podcasting on Podcast Gurus by GHA Marketing.Who is EM360 Tech?EM360Tech, founded by Michael Lodge in 2008, is a leader in enterprise tech podcasting.Our platform provides podcasts and digital content for IT a...2024-08-1239 minTech TransformedTech TransformedBeyond the AI Hype: The Challenges AI Brings to the IT IndustryWhile generative AI and large language models often receive inflated acclaim, their true value is found in harnessing intelligence and data-driven insights. Despite the hype, AI has its shortcomings, such as large language models sometimes being solutions looking for problems and challenges in understanding its impact on advertising and making savvy investment decisions.In this podcast, Dana Gardner, President & Principal Analyst of Interarbor Solutions, and Paulina Rios Maya, Head of Industry Relations at EM360Tech, discuss why AI should be seen as a transformational technology rather than just another automation tool. Key Takeaways...2024-07-2510 minThe Security StrategistThe Security StrategistWhy the Cybersecurity Industry Needs PodcastsPodcasts are revolutionising how we raise awareness about cybersecurity. They offer an interactive and engaging way to bring essential topics like AI, zero trust, and the human element into everyday conversations. By breaking down these complex issues into relatable and exciting discussions, podcasts make cybersecurity accessible and understandable to a broader audience.In this podcast, Chris Steffen, VP of Research at EMA and Paulina Rios Maya, Head of Industry Relations at EM360Tech, discuss the transformative power of podcasts in the cybersecurity world. Key TakeawaysPodcasts are a valuable tool for educating an...2024-07-2418 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataBreaking Barriers With Accessible Data VisualisationOne of the biggest challenges businesses face when it comes to data visualisation is handling the volume of data and the need for faster processing methods. There's a common misconception that effective data visualisation must be fancy and interactive, but simple visuals can be just as powerful. Ann K. Emery, an expert in the field, believes that accessibility doesn't have to be time-consuming or expensive. In this podcast, she shares actionable strategies for creating accessible visualizations with Paulina Rios Maya, Head of Industry Relations at EM360Tech. Key TakeawaysAvo...2024-07-2314 minTech TransformedTech TransformedCountdown to Infosecurity Europe 2024Infosecurity Europe is a cornerstone event in the cybersecurity industry. It brings together a diverse array of cybersecurity services and professionals for three days of unparalleled learning, exploration, and networking. At its essence, the event is committed to delivering indispensable value to its attendees through meticulously crafted themes and discussions.This year's focus revolves around resilience, artificial intelligence, legislation and compliance, leadership and culture, and emerging threats. With a comprehensive program featuring keynote speakers, strategic talks, insightful case studies, state-of-the-art technology showcases, dynamic startup exhibitions, and immersive security workshops, Infosecurity Europe offers a comprehensive immersion into the...2024-05-1519 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataTraining Skilled Professionals: Inclusivity in STEMHybrid working has become a common talking point of many organisations in the last year as the increase of remote working has transformed several industries. As one might expect, a change in our work culture drastically changes the demands of our workers, meaning that more skilled professionals are required to handle independent working. The problem is that in its current state, the UK is underprepared for this paradigm shift; according to Coursera's Global Skills Report, the UK has the lowest proficiency for business skills in Europe, ranking only at a 29% proficiency. There is hope for the UK yet...2021-07-0724 minThe Security StrategistThe Security StrategistAnalysing the Top Indicators of BehaviourCybersecurity has revolved around several different methodologies over the last decade, but the arguments for and against using an approach based on "Indicators of Compromise" remain prevalent to this day. Relying on the top indicators of compromise, or IOC, depends upon finding threats as and when they appear. New methodologies incorporate a slightly more anticipatory model, however; Indicators of Behaviour, or IOB, work to understand the common signs that could potentially lead an organisation to be struck by a cyber attack.Having a firm understanding of these topics is essential for any CISO or anyone involved in t...2021-07-0221 minThe Security StrategistThe Security StrategistWhat Cybersecurity Experts Get WrongWhen it comes to using a cybersecurity product, relying on new technology has often been seen as the primary objective. What cybersecurity experts are starting to realise, however, is that technology by itself has limitations; the perfect combination actually comes from having good technology and skilled professionals who know how to use it. Many security technologies rely on an alert basis; a method that notifies professionals to investigate problems as and when they appear. The problem with this is that, according to Arctic Wolf, 44% of security alerts are actually not investigated. What cybersecurity solutions do I need to k...2021-06-1620 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataData Health in Data-Driven OrganisationsWhile organisations are gradually becoming more data-driven, there are still organisations that rely solely on instinct. According to Talend's 2021 Data Health Survey, a whopping 36% of executives are still making gut based decisions, a method which has proved time and time again to be both inefficient and unpredictable. One of the contributing factors to gut based decision making is a lack of trust in data. Data quality varies from industry to industry but within single organisations, it can also vary from person to person. In fact, 38% of data users state that there are no data quality standards in place in...2021-06-0231 minThe Security StrategistThe Security StrategistSocial Engineering: Psychological Warfare in the CyberspaceFrom the usage of anti-money laundering software all the way to endpoint security, the enterprise space is always preparing for the next attack. Recognising the fact that as much as you train and prepare your organisation, adversaries will also continue to advance can be anxiety inducing. Yes, organisations lose billions every year to fraud and the beginning of 2021 was met with a huge influx in cybercrime, but it's the methods that the adversaries are using that is truly concerning. Social engineering is a method used by adversaries in the cyberspace that works by gaining the tr...2021-05-1826 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataSolving the Issue of Data on Kubernetes with DatastaxWhile it has taken the lead position in infrastructure management, managing data on Kubernetes is a complex subject for many in the industry. Matching users expectations for container-orchestration systems against the needs they have for their databases have unveiled a multitude of unexpected issues.In recent years, storing data within Kubernetes has become more and more common. However, users are still experiencing the same issues. In this new episode of Data Transforming Business, we speak to Datastax’s VP of Developer Relations Patrick McFadin about solving the problems affiliated with data on Kubernetes and what you need to...2021-05-0420 minThe Security StrategistThe Security StrategistBuilding resiliency through disruption with RSA SecurityAs businesses become more complex it opens up numerous issues that need to be accounted for including business processes, critical business and IT functions, and third-party relationships. These factors can be hard to coordinate across departments and this lack of visibility makes it difficult to prove and report that continuity and recovery plans are in place and will work as intended. Resiliency programs allow for a proactive approach in order to address and mitigate resiliency risk to your organisation. Resiliency requires building processes and technologies that naturally adapt to adverse conditions, make mid-course corrections, and avoid any negative impacts...2021-02-1618 minThe Security StrategistThe Security StrategistSecure remote working practices with Menlo SecurityThe need to adapt corporate IT systems to support more flexible working is not new. The response of businesses to these trends over the last two decades has been on a spectrum from highly supportive – as much flexibility as possible – to highly conservative – the risks are too great. These risks, that have held many businesses back, include the loss of control over what employees are doing and who they are interacting with, to the danger of corporate and controlled personal data getting into the wrong hands. Since the forced lockdown even the most conservative businesses have recognised the benefits of hom...2021-02-0221 minThe Security StrategistThe Security StrategistHow inbox defence protects against increasingly sophisticated attacks with BarracudaThe impact of cyberattacks on organisations is widespread not only from a financial standpoint, but also the operational disruptions, damaged brand reputations, and trust within the organisation. Traditional email security solutions aren’t enough to protect businesses anymore. Processes need to be in place to actively defend against sophisticated email threats. These threats are often able to bypass defences by using numerous backdoor techniques.In this podcast, Olesia Klevchuk, Senior Product Marketing Manager at Barracuda explores different email threat types and what measures can be taken to protect organisations. To begin with, Olesia explains some of the th...2021-01-1926 minThe Security StrategistThe Security StrategistNavigating a crisis and the benefits of Zero Trust with InfobloxThe majority of organisations have been working from home for the last few months amidst the COVID-19 pandemic. This rapid change has bought many new challenges for organisations to overcome. One of these challenges has been how we secure remote users and maintain security control for the organisation. The concept of Zero Trust is emerging as the preferred remedy for addressing remote work security challenges. The fundamental goal is to avoid reliance on trusted networks and to treat every system as an untrusted host.In this podcast, Chris Steffen speaks to Krupa Srivatsan, Director of Product Marketing...2021-01-0524 minThe Security StrategistThe Security StrategistThe Business Balancing Act – User Experience and Security with Auth0For organisations that want to ensure safe, scalable, and efficient access to their services, effective identity and access management solutions are essential. However, ensuring maximum security and maintaining a smooth user experience is a challenge. The more we move into the digital environment, the more each company must focus on these aspects and construct the identity and access management (IAM) programs with the users in mind.In this podcast, Kris Imbrechts, Regional Director Northern & Southern Europe at Auth0 explains the business balancing act between user experience and security. To begin with, Kris explains the current state of IAM solu...2020-12-2220 minThe Security StrategistThe Security StrategistThe use of external threat intelligence for proactive IT security with IntSightsKeeping your business safe requires a proactive analysis of potential online threats. This requires more than details of latest malware and software vulnerabilities. Intelligence is also required about what is happening in cyberspace that may represent a specific threat to your business. The deepest recesses of the web need probing to gathering this intelligence. Not just the clear web, the websites that we all use on a day-to-day basis, but also the dark and, where possible, deep web.In this podcast, Bob Tarzey speaks with Charity Wright, Cyber Threat Intelligence Advisor and Etay Maor, Chief Security Officer at I...2020-12-0825 minThe Security StrategistThe Security StrategistUnderstanding the current state of SOAR and its future with SwimlaneManual incident response processes, insufficient workflows and difficulty hiring security personnel leave security operations teams struggling to keep up with the growing volume of alerts. SOAR solutions combine automated data gathering, security automation, case management and analytics to provide organisations the ability to speed up the incident response process.In this podcast, Bob Tarzey speaks with Cody Cornell, Co-founder and CEO at Swimlane, a U.S. based independent SOAR solution provider. Cody introduces how businesses are adopting SOAR tools and explains the ease in which they are deployed. He also provides some use cases for the type of w...2020-11-2418 minThe Security StrategistThe Security StrategistIT Security Policy Management and Automation with FireMonAs security requirements evolve, so must the policies surrounding them. Today, businesses are responsible for updating policies consistently across all relevant security devices regardless of function and supplier. Given the sheer volume, a manual approach would be too impractical. Thus, organisations must turn to specialist products that harness automation as a means to cover more diverse security requirements and enhance security analytics and intelligence.In this podcast, Bob Tarzey speaks with Andrew Lintell, Vice President and Managing Director, EMEA at FireMon. Andrew introduces the FireMon brand and how diverse the devices are that such vendors cater for. He a...2020-11-1023 minThe Security StrategistThe Security StrategistApplication Security in the age of DevSecOps with WhiteSourceThe advent of DevOps was hailed as a means to have all aspects of application deployment handled by one single team. However, over time, concerns surrounding security have begun to arise. Many feel that security should be more of a priority for Development & DevOps teams, particularly in regard to applications. On the one hand, apps are a modern necessity to drive business success. However, on the other hand, they come with a host of security problems that need special attention, necessitating DevSecOps in turn.Joining us to lend his expertise on this matter is Jeff Martin, Senior...2020-10-2723 minThe Security StrategistThe Security StrategistOptimising Application Security with Contrast SecurityApplications are a double-edged sword for businesses. On one hand, they are a modern necessity to drive business success. However, on the other, they come with a host of security problems that need special attention.Joining Bob Tarzey to outline the considerations specific to application security is Jeff Williams, Co-Founder and CTO at Contrast Security. In particular, Jeff details the threat posed by the fact that we simply aren’t very good at writing vulnerability-free software, and why this is the case. As well as this, they discuss the role of DevOps, and specifically, DevSecOps, in software develo...2020-10-1327 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataS4E9: The Power of an Analytics Operating SystemAs businesses endeavour to effectively action their data, business intelligence (BI) software and analytics operating systems have become all the more important and cherished. Not only do BI software fulfil their purpose of helping companies attain useful business insights, but they can also support flexibility and strengthen governance.Joining Ronald van Loon and EM360 to lend his BI expertise is Ian Macdonald, Principal Technologist at Pyramid Analytics. Firstly, Ian gives a comprehensive introduction to analytics operating systems, before giving an overview of the BI market. He also delves into the improved work capabilities that BI provides to b...2020-09-0137 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataS4E8: Data Integration and AnalysisWhen an organisation talks about data integration, there are a lot of hurdles to overcome. To achieve results they need to make sure their data is of high quality, organised and formatted. However, this is easier said than done as data engineers are trying to extract data from an ever-changing source. With cloud-based applications and siloed data, it raises a lot of questions as to how to achieve a unified view and gain insightful analytics.In this podcast, Ronald van Loon speaks to Mark Maxwell, Head of UKI Strategic Sales at Fivetran. Firstly, Mark outlines why an org...2020-08-2526 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataS4E7: Guiding DataOps Teams Through Rapid Change and UncertaintyData pipelines are becoming a quintessential part of every organisation that is wanting to be data fluent. This means DataOps is becoming increasingly more important in this process as it is used by analytic and data teams, to improve quality and reduce the cycle time of data analytics. However, now organisations are facing unprecedented challenges with current events and widespread lockdown. It's important to understand how to guide DataOps teams through these rapid changes and uncertainties so that data can remain functional.In this podcast, Ronald van Loon speaks to Suki Dhuphar, EMEA Field Engineering Lead at Ta...2020-08-1822 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataS4E6: Modern Data Management Enabled by Data VirtualisationFor organisations of any size, data management is key and data virtualisation is the next logical step in making that a reality. The role that data virtualisation plays within data management is to bridge the gap between IT and the business. This allows the combination of data in real-time and allows for true business transformation, so that the data is available to everybody while keeping it secure, allowing users or other applications to gain the access and insights they need.In this podcast, Ronald van Loon speaks to Paul Moxon, Senior SVP of Data Architecture & Chief Evangelist, Charl...2020-08-1132 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataS4E5: How to Manage your Data and Analytics JourneyOrganisations who are in the early stages of data analytic maturity struggle with poor data quality, inconsistent processes and lack of co-ordination across their organisation. Also, those organisations with low BI maturity don’t have formal governance programs in place at all. These low maturity organisations often have BI platforms that are more traditional and reporting centric. In this podcast, Ronald van Loon speaks to Ed Thompson, CTO at Matillion about how an organisation can achieve data and analytics maturity.Firstly, Ed outlines a typical customer experience and how you define data milestone along with the tools nee...2020-08-0431 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataS4E4: Transforming Enterprise Application through NoSQLAcross organisations, we see a drive for next-generation systems as organisations require more scalability and flexibility. With these demands comes the need for a change in architecture so that businesses can help develop the next generation of systems and move from traditional relational databases to NoSQL databases. In this podcast, Ronald van Loon speaks to Dr Mohammed Haji, Manager - EMEA North Solutions Engineering at Couchbase and Mritunjay Singh, Principal Solution Architect at BT to understand how NoSQL can transform enterprise application. Firstly, they discuss NoSQL integration for supporting cloud-native applications, and the key role NoSQL plays in ne...2020-07-2848 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataS4E3: The Strategic Power of Data Warehousing and People AnalyticsAll businesses understand that there is real value in data and that it is a strategic asset for all organisations. However, a lot of companies are still struggling to rapidly unlock this value due to a lack of resources and time. In order to capitalise on this, organisations need to have a solid data warehousing solution in place. In this podcast Ronald van Loon speaks with Weelin Lim, Chief Product Officer at TrueCue and Pratim Das, Head of Solutions Architecture, Data and AI at Microsoft to understand the strategic power of data warehousing and people analytics.Firstly...2020-07-2132 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataS4E2: How Real-Time Data Supports Application Development in the CloudData has become a valuable asset for businesses in every industry. In particular, it enables organisations to fine-tune their strategies, deliver better customer experience, and much more. As a result, cloud has become increasingly commonplace within enterprise environments. Simultaneously, Internet of Things (IoT) has also grown in popularity and will continue to do so as our future becomes increasingly connected.In light of this, Ronald van Loon, Director at Adversitement, speaks with Hannu Valtonen, VP Product & Co-founder at Aiven, to explore real-time data's role in application development in the cloud. Firstly, Hannu delves into how companies use da...2020-07-1421 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataS4E1: The Evolution and Revolution of RPA TodayRobotic process automation (RPA) has gained significant traction within the last year. However, despite having secured a place in the market, RPA is still fairly new. In light of this, Ronald van Loon speaks with Rob Hughes, VP – Head of Marketing EU at Automation Anywhere to find out more about this exciting technology.Firstly, Rob defines RPA and what makes it such a hot topic today. In particular, he addresses the confusion between artificial intelligence (AI) and RPA and outlines AI's role in the RPA realm. Then, Rob explores what is driving the increasing popularity of RPA and...2020-07-0727 minThe Security StrategistThe Security StrategistPreventing Credential Stuffing Attacks with Shape SecurityToday's increasingly digital enterprise environment means that businesses must combat more threats than ever. However, it's not just the new generation of threats that they need to worry about. Organisations must also consider the threats that have stood the test of time. In particular, credential stuffing is one that has persisted over the years. Unfortunately, the misunderstandings surrounding it makes it all-the-more difficult to mitigate.In this podcast, Shuman Ghosemajumder, CTO at Shape Security, lends his expertise on the matter of credential stuffing. Firstly, he recaps what credential stuffing is and why it is still prevalent to t...2020-04-0320 minThe Security StrategistThe Security StrategistBalancing Privacy and IT Security with ZscalerTechnology has enjoyed an ongoing revolution, meaning organisations today can enjoy cloud, Internet of Things, artificial intelligence, and more – all of which are significantly advantageous for business. However, as organisations begin to heavily rely on these innovations, it begs the question: how should businesses strike the balance between delivering useful, available IT services and protecting the privacy of employees and customers?In this podcast, Bob Tarzey speaks with Nathan Howe, Director of Transformation Strategy at Zscaler. Firstly, Nathan delves into how cloud, mobility, and crypto make up the 'unholy trinity' in cybersecurity. Then, he explores the effect of...2020-04-0325 minThe Security StrategistThe Security StrategistSecure Access in the Age of Zero Trust Networking with Pulse SecureDigital transformation is creating a new security landscape. In particular, it has paved the way for more workforce flexibility, empowering employees to work how and when they wish. However, this introduces new security considerations that many businesses have not had to address before.Here to lend his expertise on the matter is Sudhakar Ramakrishna, CEO at Pulse Secure. Sudhakar walks us through the findings of an IDG global survey sponsored by Pulse Secure, investigating the state of enterprise secure access. Then, he delves into how secure access is an enabler of digital transformation, while heightening security too. F...2020-04-0325 minThe Security StrategistThe Security StrategistFullstack Vulnerability Management Implementation Benefits and Challenges with EdgescanVulnerability management is a must for enterprises today. In particular, vulnerability management automation gives businesses the scalability and frequency necessary for today's landscape. Businesses should endeavour to automate where possible, although the accuracy of automation isn't always 100%.Joining us to lend his expertise on the matter is Eoin Keary, CEO and Founder at Edgescan. Firstly, Eoin outlines the findings of a recent survey by Edgescan, which investigated validating false positives among cybersecurity professionals. Then, he explores the current challenges that cybersecurity professionals are facing today. Eoin also shares his guidance on overcoming these obstacles.2020-04-0326 minThe Security StrategistThe Security StrategistThreat Detection, Prevention, and Response with Blackberry CylanceCybersecurity is an unrelenting matter for organisations, and no organisation is truly immune. In particular, the threat that cyber risks pose to business is an increasing concern for IT departments and senior management alike. Thus, it is becoming increasingly important to consider how best to mitigate these risks.In this podcast, freelance IT industry analyst Bob Tarzey speaks with Brian Robison, Chief Evangelist at Blackberry Cylance. Brian begins by sharing his thoughts on how to prevent cyber attacks. In particular, he details Blackberry Cylance's approach of utilising computing power and AI to build a predictive model. Also, Br...2020-04-0325 minThe Security StrategistThe Security StrategistAutomated Protection Against Common Vulnerabilities and Exposures with SixgillAttacks have become part and parcel of an organisation's lifespan. However, in most cases, this is the result of the attacker being able to exploit a weakness in the organisation. Thus, organisations must do what they can to understand their vulnerabilities and their impact. But understanding and reporting common vulnerabilities and exposures (CVEs) are rigorous tasks. Therefore, companies may benefit from using tools to increase automation and reduce manual procedures.In this podcast, freelance IT industry analyst Bob Tarzey speaks with Benjamin Preminger, Senior Cyber Threat Intelligence Specialist at Sixgill. Benjamin begins by outlining the differences between com...2020-04-0319 minThe Security StrategistThe Security StrategistSocial and Digital Endpoint with SafeGuard CyberBusinesses are increasingly utilising channels such as LinkedIn and WhatsApp to enhance customer interactivity and stay connected with team members. However, the current network security infrastructure was established before their creation. As a result, third-party apps have introduced security risks that the current structure cannot account for. Thus, businesses must take extra care to ensure their channels are secure.Otavio Freire, President, CTO, and Co-Founder at SafeGuard Cyber, joins us on this podcast to discuss the matter. Firstly, Otavio details the shortfalls of the current infrastructure and how this impacts companies' social and digital channels. Of course, t...2020-04-0313 minThe Security StrategistThe Security StrategistContinuous Controls Monitoring for Cybersecurity with PanaseerThe cybersecurity industry has significantly evolved over the last few decades. The fact that there is simply more of everything is a huge contributor to this. This includes more technologies, more people, more data sets, and so on. However, the threat landscape has also changed and become more complex. This has ultimately led to cybersecurity having to be at the forefront of enterprise risk agendas.In this podcast, Dr Andrew Aken speaks with Nik Whitfield, CEO and Founder at Panaseer. Nik lends his expertise on establishing a cyber infrastructure. As well as this, Nik delves into the c...2020-04-0344 minThe Security StrategistThe Security StrategistSecuring the DevOps Process with Capsule8The advent of DevOps was hailed as a means to have all aspects of application deployment handled by one single team. Quicker updating of applications and better accountability of developers were among the many advantages of DevOps. However, over time, concerns surrounding security have begun to arise. Many feel that security should be more of a priority for DevOps teams.In this podcast, freelance IT industry analyst Bob Tarzey speaks with Kelly Shortridge, VP of Product Strategy at Capsule8. Kelly outlines the DevOps process and how it affects IT security. As well as this, she advises on t...2020-04-0323 minThe Security StrategistThe Security StrategistThe Rapid Changes in Cybersecurity Due to Advanced AI with DarktraceCybersecurity is changing rapidly due to advanced AI. These changes mean security officers have to adapt and utilise AI effectively to combat numerous growing threats. A different approach is necessary to detect threats that signature technologies may have missed. Advanced end-to-end AI, allows security officers to transform their strategies from the classic reactionary cycles.In this podcast, Industry Analyst at 451 research, Eric Ogren speaks to Nicole Eagan, CEO of Darktrace and JR Tietsort, Visionary Security Executive at CoreScientifc. They speak about the impact AI is having across all aspects of cybersecurity.2020-04-0325 minThe Security StrategistThe Security StrategistCybersecurity Responding to Demand with SecureDataAssessing, detecting, and responding to cyber threats are not new pursuits. However, evolving technology and innovating attackers make this a more challenging endeavor. More specifically, companies must be ahead of the changing nature of the threats and act at speed once encountered. Businesses today must have the necessary skills, agility, and underlying platforms to help them mitigate these risks.In this podcast, hosted by freelance analyst Bob Tarzey, SecureData's Chief Strategy Officer, Charl van der Walt lends his expertise on the matter. Firstly, he discusses how organisations should prioritise their plan of action. Then, he outlines a basi...2020-04-0320 minThe Security StrategistThe Security StrategistNew Risks Arising for Businesses Through Increased Digitisation with RSAThe scope of digitisation and the speed of adoption has increased rapidly in the last few decades. Virtually every aspect of any business operation feels this impact from supply chains to customer relationships. This pervasive aspect has changed the risk profile for every business.Therefore, businesses have had to transform the way they assess risk. Managing digital risk requires the tools to assess where the risks lie, how to mitigate them and to measure the effectiveness of the protections put in place.Freelance IT industry analyst Bob Tarzey speaks to Peter Beardmore, Director of Marketing f...2020-04-0325 minThe Security StrategistThe Security StrategistThe role backup and recovery tools can play in enhancing IT security with UnitrendsSecurity covers every aspect of IT infrastructure and usage, to ensure the protection of users, data and business processes. Backup and recovery tools are a way to restore lost data after any number of issues. However, security attacks can often aim to mimic such incidents for ransomware purposes. Adapting backup and recovery tools to try and provide backstops against these threats is something organizations need to be implementing.Freelance IT industry analyst Bob Tarzey speaks to Joe Noonan, VP of Product Management and Marketing at Unitrends. They speak about how backup tools can adapt to prevent ransomware a...2020-04-0320 minThe Security StrategistThe Security StrategistPart 3: How To Map Endpoint Security to a Contemporary Security Strategy? with EndgameWith organizations poised to spend more than $5B+ on endpoint security software this year, it raises the question: What should enterprises be asking from security vendors, and how can they parse signal from all the marketing noise?In this podcast series, hosted by freelance analyst Bob Tarzey, he speaks to Ian McShane who as a former Gartner analyst focuses on the endpoint security market. Ian McShane has written extensively about the failure of antivirus vendors to defend against modern attacks, and the marketing hype surrounding “next-gen” antivirus.Part 3 - How To Map Endpoint Security To A Co...2020-04-0315 minThe Security StrategistThe Security StrategistPart 2: What’s Next for Endpoint Security? with EndgameWith organizations poised to spend more than $5B+ on endpoint security software this year, it raises the question: What should enterprises be asking from security vendors, and how can they parse signal from all the marketing noise? In this podcast series, hosted by freelance analyst Bob Tarzey, he speaks to Ian McShane who as a former Gartner analyst focuses on the endpoint security market. Ian McShane has written extensively about the failure of antivirus vendors to defend against modern attacks, and the marketing hype surrounding “next-gen” antivirus.Part 2 - What’s Next for Endpoint Security?...2020-04-0315 minThe Security StrategistThe Security StrategistPart 1: How Endpoint Security Got To Now? with EndgameWith organizations poised to spend more than $5B+ on endpoint security software this year, it raises the question: What should enterprises be asking from security vendors, and how can they parse signal from all the marketing noise? In this three-part podcast series, hosted by freelance analyst Bob Tarzey, he speaks to Ian McShane who as a former Gartner analyst focuses on the endpoint security market. Ian McShane has written extensively about the failure of antivirus vendors to defend against modern attacks, and the marketing hype surrounding “next-gen” antivirus.Part 1 - How Endpoint Security Got To Now2020-04-0314 minThe Security StrategistThe Security StrategistFinding Better Methods to Address Application Security with Rapid7New software code is released almost as fast as new ideas are conceived in the tech industry. While this growth is necessary, it makes web applications rather vulnerable places online, as these are exposed to the online world and easily targeted. It's time to find better methods to address application security.In this podcast, freelance analyst Bob Tarzey talks to Rapid7's Ben Glass, Manager of Enterprise Security Consulting, and Jay Paz, Director of Penetration Testing and Consultant Development, about finding better methods to address application security and building better code.2020-04-0317 minThe Security StrategistThe Security StrategistSupporting Technology for Application Security with Rapid7New software code is released almost as fast as new ideas are conceived in the tech industry. This makes web applications some of the most vulnerable places online, as these are exposed to the online world and easily targeted.In the previous episode, Bob Tarzey spoke to Rapid7's Ben Glass and Jay Paz, Manager of Enterprise Security Consulting and Director of Penetration Testing and Consultant Development, respectively, about building better code to stay secure.In this second podcast Bob, Jay and Ben look at some of the supporting technology to avoid vulnerability in companies...2020-04-0322 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataS3E11: How is Data Transforming Business? An Augmented Intelligence Podcast with Cosmo TechAugmented intelligence is driving the well-overdue reevaluation of data models. Michel Morvan at Cosmo Tech and Robert Plana at Assystem join us on this podcast to talk with us about augmented intelligence, as well as Cosmo Tech’s role in it.  For information regarding your data privacy, visit acast.com/privacy2019-11-1222 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataS3E10: How Business Intelligence and AI Are Powering Today’s Data-Driven OrganisationsA recent 451 Research survey of enterprise users showed that 84% found at least some of their strategic decisions at their organisations are data-driven. Further to this, the survey found that data is becoming increasingly important to organisations. So, how should companies be acting on their data? Here to lend his expertise on the matter is John Walls at Looker. John shares his thoughts on the opportunities related to self-service analytics and how to deliver the benefits without compromising governance or unified metrics. For information regarding your data privacy, visit acast.com/privacy2019-11-0543 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataS3E9: Enabling Real-Time Data Management For The Modern EnterpriseAdvanced analytics are powering today's decision making and operational efficiency. Today’s organisations can now take advantage of real-time decision making with thanks to newer technologies. However, does this guarantee quality? Joining us in this episode to discuss how to manage the quality of real-time data is Syncsort’s Aisan Baird. For information regarding your data privacy, visit acast.com/privacy2019-10-2924 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataS3E8: Data Preparation and Advanced Analytics - How Data Practitioners Are Changing the LandscapeBig data, IoT, and cloud are just three technologies that encourage businesses to become more data-driven. More and more organisations are recognising the benefits of leveraging data for strategic advantage. However, this boom in data has uncovered an IT skills gap, leaving business-centric staff trying their hand at filling it. Fortunately, the tools available today are easy to use, taking some of the burden off. Chris Maddox at Paxata and Jean-Luc Chatelain at Accenture, a key partner of Paxata, join us to talk about these tools. For information regarding your data privacy, visit acast.com/privacy2019-10-2209 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataS3E7: Cloudy Skies Lie Ahead - The Question Is: Public or Private?The promise of the public cloud has instead paved the way for inconvenient costs. This is a result of applications becoming more refined, leaving companies wondering where to deploy them. Does this mean that private cloud is the way forward? Joining us in this episode to talk public versus private is JR Rivers, Co-Founder and Chief Technology Officer at Cumulus Networks. For information regarding your data privacy, visit acast.com/privacy2019-10-1520 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataS3E6: Transforming Business Intelligence with MetadataToday’s business intelligence groups can take advantage of Octopai’s automated centralised cross-platform metadata search engine. This allows such groups to quickly discover and also govern shared metadata. While metadata management is nothing new, new methodologies are transforming the effect it can have on business success. Joining us in this episode to talk about Octopai’s platform and optimising metadata is Amnon Drori, CEO and Co-Founder of the company. For information regarding your data privacy, visit acast.com/privacy2019-10-0817 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataS3E5: Building Analytics Applications for Driving Business ValueOrganisations are turning to business intelligence (BI) and data analytics to give their strategy a competitive edge. This is especially so in an age of digital transformation. At hand to lend their expertise on the matter are Yellowfin’s Glen Rabie and TreeHive Strategy’s Donald Farmer. For information regarding your data privacy, visit acast.com/privacy2019-10-0118 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataS3E4: How SAS is Moving to the Forefront of Providing Data VisualisationData visualisation is increasing in popularity as companies move towards making intelligent data-driven decisions. Analytics providers are recognising this and, as a result, are offering innovative ways to visualise insights. Joining us on this podcast today is Jimmie Lenz, Principal at The Financial Risk Group, to demonstrate how SAS are moving to the forefront of data visualisation. For information regarding your data privacy, visit acast.com/privacy2019-09-2412 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataS3E3: How Artificial Intelligence (AI) is Transforming BusinessToday’s episode explores the ways that AI is reshaping how organisations do business in this digital economy. In particular, the discussion focuses on what it means for the future and the million dollar question: will AI replace human beings? Spencer Doyle, Chief Business Developer at Noodle.ai, joins us to give his perspective on AI in the industry. For information regarding your data privacy, visit acast.com/privacy2019-09-1721 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataS3E2: The Impact of Business Machine LearningGlobally, companies have been redressing themselves as more data-driven, or as data companies. This is due to data becoming widely acknowledged to drive innovation today. One company that has embraced this is Deutsche Telekom. Notably, the company launched a data intelligence hub that became the first marketplace offering secure data exchange for business customers and AI. In this episode, Sven Löffler at Deutsche Telekom and Chris Darvill at Cloudera discuss the innovative platform. For information regarding your data privacy, visit acast.com/privacy2019-09-1018 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataS3E1: Architecting Big Data Across the EnterpriseKickstarting our third series of Data Transforming Business, EM360’s David Argent met with Nick Curcuru, formerly at Mastercard, and Matt Maccaux, formerly at Dell EMC, to talk big data. In this episode, our speakers go back to basics, starting by exploring where the term ‘big data’ came from. As well as this, they strip back any confusion surrounding big data and tell us what it means fundamentally. For information regarding your data privacy, visit acast.com/privacy2019-09-0330 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataS2E3: Unlocking Business Insights from ERP SystemsMost organisations today rely on ERP systems to manage their complex business processes, but are often frustrated in integrating these systems due to their technical complexity. Sage provides a unique solution that provides a robust ERP systems with a strong focus on business insights and analytics. A prime focus of the solution is to unlock the business value of ERP systems by analysing the valuable data from these systems, and integrating them with other key data sources such as data warehouses and data lakes. Join David Rawling from Sage and Donna Burbank from Global Data Strategy as they discuss...2017-06-0500 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataS2E2: Self-Service Business Intelligence for ERP Systems – Dream or Reality?Self-service business intelligence (BI) is a growing trend as more and more business users want to be in greater control of their own reporting and analytics. Business users are often frustrated, however, when faced with the underlying complexities of the data structures and interrelationships between data sources. ERP systems are notoriously complex in terms of their underlying data structures, given the vast amount of tables and undecipherable data structures & business context. Given the fact that the majority of businesses today run on ERP systems, much of the data that’s most critical to the business resides in these systems. Is...2017-05-2911 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataS2E1: Best Practices in Becoming a Data-Driven OrganisationLagan Group Holdings is a leader in the construction and asset management space, and a key part of their strategy is to become more data-driven, using data for strategic advantage. A challenge, however, is that data is scattered in a number of systems—from billing to procurement to payroll, making it difficult to create a single view of key data assets. Lagan has overcome these challenges, and have implemented a self-service business intelligence & reporting to gain data-driven insights. Join Jim Fennell from Lagan Group and Donna Burbank from Global Data Strategy as they discuss the challenges and benefits of us...2017-05-2209 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataS1E5: Powering Digital Business Transformation through InformationIn the fifth and final episode of the first series, Donna Burbank is joined by the Vice President of Global Big Data Consulting at Mastercard and a representative from Dell EMC. This episode explores how the digital economy is changing the way organisations do business around the world to such an unprecedented scale that it is now being called the next industrial revolution. There are plenty of tips on how to protect your most important asset - information! Whether you are a Chief Data Officer looking to understand what new technologies and methodologies are available or a businessperson trying...2017-04-2136 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataS1E4: The Role of the CDO in Data-Driven Business TransformationIn the fourth episode of the series, Donna Burbank chairs a panel consisting of the CTO from DS Virgin Racing Formula E Team and also representatives from HPE and Cloudera. They discuss how new business models are emerging as data-driven technology provides opportunity for change. The also look at whether the CDO, traditionally a ‘back office’ role is now one of the most important roles within an organisation. Whether you are a Chief Data Officer looking to understand what new technologies and methodologies are available or a businessperson trying to understand the challenges, listen to this educational podcast to disc...2017-04-2135 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataS1E3: Data Modelling, Digital Transformation and Data as a Profit DriverThis is the third episode of the series and Donna Burbank is joined by Erwin, Sandhill Consulting and Swisscom. The panel discuss innovative ways to increase revenue and reduce costs using data-driven digital technologies. Whether you are a Chief Data Officer looking to understand what new technologies and methodologies are available or a businessperson trying to understand the challenges around data quality, listen to this educational podcast to discover how data modelling can support your business transformation initiatives. For information regarding your data privacy, visit acast.com/privacy2017-04-2036 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataS1E2: Enterprise Data Warehouse Optimisation using HadoopThis is the second episode of the series and here Donna Burbank is joined by representatives of Syncsort and Hortonworks. The panel discuss whether Hadoop augments the data warehouse or replaces it and conclude by looking at how business users and IT can work together in these ecosystems in the future. Whether you are a Chief Data Officer looking to understand what new technologies and methodologies are available or a businessperson trying to understand the challenges around data quality, listen to this educational podcast to discover how data quality and data governance can support your business transformation initiatives.2017-04-2028 minDon\'t Panic! It\'s Just DataDon't Panic! It's Just DataS1E1: Is Data Quality & Data Governance keeping pace?For the first episode Donna Burbank is joined by representatives of Barclays, Collibra and Trillium Software to discuss the ways organisations think about innovation and growth. The panel discuss how accurate, relevant and timely data is the key to success. Whether you are a Chief Data Officer looking to understand what new technologies and methodologies are available or a businessperson trying to understand the challenges around data quality, listen to this educational podcast to discover how data quality and data governance can support your business transformation initiatives. For information regarding your data privacy, visit acast.com/privacy2017-04-2045 min