Discover
Bill Murphy's RedZone 10X Podcast

Bill Murphy's RedZone 10X Podcast
Author: Bill Murphy
Subscribed: 0Played: 9Subscribe
Share
© 2015 RedZone Technologies, LLC
Description
The 10X Podcast explores the latest in technology, innovation, creativity, leadership, psychology, health/wellness, and more. Host Bill Murphy is joined by top CIOs, authors, and other leaders at the forefronts of business and innovation. A great listen for business IT leaders guiding their organizations through disruption and exponential change.
170 Episodes
Reverse
Joyce is a professor of Psychology at Emmanuel College in Boston and an Associate Member of the Human Evolutionary Biology department at Harvard University. She is an author of a fascinating book called Warriors and Worriers: The Survival of the Sexes. The book explores the evolutionary differences between men and women and how they survive through competitiveness. Drawing on an interesting array of studies and stories that explore the ways boys and men deter their enemies, while girls and women find assistants to aid them in coping with vulnerable children and elders, Benenson turns upside down the familiar wisdom that women are more sociable than men and that men are more competitive than women. As much as I love to interview guests on leadership and high performance topics on my podcast, in this interview, Joyce and I discuss what IT business leaders could learn from her studies on gender differences to get the most out of their high performance teams.
I'm very excited about my guest for today, for you. It's Barry Libenson, Global CIO for Experian. He was responsible for, is responsible for, the design and delivery of global technology strategy. Prior to joining Experian in 2015, he was Senior Vice President and CIO of Safeway in North America. Before that he was CIO and VP of Land O' Lakes. He has a continuous track record of huge success in the CIO capacity. This is his number two episode with me and with the RedZone Podcast. This is the kind of stuff you're going to get out of this episode with Barry today:
David Linthicum is the Chief Cloud Strategy Officer at Deloitte Consulting and has been named the #1 Cloud Influencer via a major report by Apollo Research. David is a Cloud Computing Thought Leader, executive, consultant, author, and speaker, who has been a CTO five times for both public and private companies, and a CEO twice in the last 25 years. Few individuals are true giants of cloud computing, but David's achievements, reputation, and stellar leadership have earned him a lofty position within the industry. It's not just that he is a top thought leader in the cloud computing universe, but he is often the visionary that the wider media invites to offer its readers, listeners, and viewers a peek inside the technology that is reshaping businesses every day. More specifically, David is a Gigaom research analyst on cloud computing and enterprise applications and writes prolifically for InfoWorld as a cloud computing blogger. He is also a contributor to, IEEE Cloud Computing, Tech Target's SearchCloud, and SearchAWS, and is quoted in major business publications including Forbes, Business Week, The Wall Street Journal, and the LA Times. David has appeared on NPR several times as a computing industry commentator, and he also does a weekly podcast on cloud computing. With more than 13 books on computing, more than 5,000 published articles, greater than 500 conference presentations, and numerous appearances on radio and TV programs, David has spent the last 20 years leading, demonstrating, and teaching businesses how to use resources more productively while continuously innovating. When I talked with David, he had recently written a great article that I loved, Cloud security secrets your cloud provider doesn't want you to know. Asking the obvious question was a perfect starting point for our conversation because I really wanted to know - What are the secrets some of the providers don't want you to know? I'm excited for you to tune in to this compelling interview. Here are some questions answered in this podcast. Businesses have a tendency to learn from pain. Now is the time to think independently and question why things are currently done this way. Cloud security will only improve in a culture that challenges the status quo. We need to make architectural trade-offs as to what we can do pragmatically with the technology that's out there. Security can hinder performance and cost way more money each month if not engineered into the applications and data stores correctly. Why you should have a Cloud Complexity Management Methodology? Cloud-native security solutions offered by the big providers are not helpful if you have a heterogeneous multi-cloud solution. Training counts more than technology - every dollar you spend on cloud training, you remove a thousand dollars as the cost of risk from your system. When you hire people, you need to hire people who are typically going to be continuous learners, autodidacts which is more than specific skill sets How can you have one security system that's much better than three security systems even though that one security system doesn't cover every feature and function that you need? Why create a security domain that deals with complexity and volatility that you can configure and change quickly. How to Connect with this Guest: LinkedIn Twitter Website Blog Articles written by David Linthicum referenced in Podcast: Cloud security secrets your cloud provider doesn't want you to know. Cloud security seems like something specific to a cloud provider, but emerging approaches and technologies are changing the game. 4/17/20 Are you Ready for the Brandpocalypse? by David Linthicum. Published on LinkedIn, 8/17/19 Transcript: You can go to the show notes to get more information about this interview and what we discussed in this episode. You'll find the show notes at redzonetech.net/podcasts. Leave A Review: Love this episode? Share it with your LinkedIn community here. If you haven't already, please make sure you leave us a review on iTunes or Stitcher. Not sure how to leave a review? Check out the instructions here. About Bill Murphy: Bill Murphy is a world-renowned IT Security Expert dedicated to your success as an IT business leader. Follow Bill on LinkedIn and Twitter. If you are interested in learning more about RedZone and our security expertise in particular related to Cloud and Email Security Kill Chain Strategy, Techniques and Tactics you can email cloudkill@redzonetech.net. Music provided by Ben's Sound: http://www.bensound.com/ Other Ways to Listen to the Podcast: iTunes | Libsyn | Soundcloud | RSS | LinkedIn
In this episode, we explore VR, AR, and augmented reality - And how companies and brands can utilize these technologies for marketing, innovation, training, and rapid learning.
In this episode we’re talking about Enterprise Blockchain, and how blockchain is disrupting industries with its multifaceted applications. We’re here with Husen Kapasi the Blockchain Lead at PwC Europe with focus on Enterprise Blockchain i.e. Blockchain application. Get all the resources for this episode: https://redzone10x.net/disrupting-industries-with-enterprise-blockchain-featuring-husen-kapasi
I recently caught up with Jason and we discussed several topics related to IT Security, DR, and Infrastructure. You can stream this podcast to your phone using the links below to Soundcloud on your PC or get the app on your phone. Jason is a world class technologist, businessman, and CIO. He also has a seat at the table (Board). I know this because I have sat next to him in the board room and have observed Jason who brings a unique and diverse perspective to business. He works directly with the CFO regarding finance and with Sales and Marketing as well. He is the glue for many parts of the business. In our discussion we covered the following areas: Structural has 4000 employees, 30 locations and 2000 mobile users. Tactics and Strategy related to: File Synch, DR, Pilots vs Free, Data Governance, CEO and Board Level Communication, Data Access vs App Delivery BYOD, Dropbox Replacement, Private Filesynch, workflow, collaboration, high availability, and privacy. ‘Webifying’ his corporate file systems to have 1 instance of data being able to be delivered to any desktop and device in his network. The podcast can be streamed via Soundcloud. You can watch it via your PC or you can stream to your phone by getting the Soundcloud app. I will also be launching this podcast on Stitcher and ITunes as well. Product Discussions: VMware Horizon, Nasuni, DATAnywhere BOOKS: Michael Crichton's Prey, Jack Reacher Series by Lee Child, Business at the Speed of Thought by Bill Gates
In this RedZone MasterMind Podcast 6x CIOs join me for a lightning round one hour session in which we covered primary topics that they were interested in. What emerged were 2 major themes that interested the majority and 2 secondary themes. 1. IT Security as it related to Employee training, Cloud Infrastructure security at AWS – Amazon Web Services, and Microsoft Office 365 2. Business Intelligence – Business Analytics 3. BCP / DR – Business Continuity Planning and Disaster Recovery 4. Generational issues - employees and their readiness to adopt new technology Lessons learned cover: • Office 365 – lessons learned • AWS deployment and lessons learned • Business Intelligence (BI)– Lessons learned • BI Support tools and options Qlikview • DR/BCP planning approaches –testing suggestions • Everbridge – mass notification system • Ideas on handling GenZs and Millenials
In this episode I talk with John Milano, SR VP of RCMD. I ask him questions on his cyber security insurance business and what an IT Leader needs to be asking from their insurance carrier. We cover every conceivable topic and situation. In addition he has suggested questions that all CIOs and IT and business leaders need to be asking. We discuss limits of coverage and how to buy the best appropriate policy for your business. The topics covered include: Security & Privacy Liability, Media Content, Regulatory Acts Coverage, Breach Response Fund, Legal & Forensic Expenses, Cyber Extortion, DDOS and Business Interruption, Business Interruption, Crisis Fund then listen below.
In this show I discuss High Performance teams, Accountability, Hybrid Cloud Multipliers, IT Audit & Risk Management Tools, Forced Delegation, Toxic Employee and Team Building, Incentivizing Right Behaviours, Consensus Building, Rapid Acceptance. We touch on products from HP, Microsoft, Briggs, Azure, Abriska, Myers and Varonis.
An awesome podcast with Michael Michalko discussing Brainstorming | Michelangelo | Socrates | Einstein | Applied Imagination | Adversity | Addiction to Comfort | Pattern Recognition | Problem-solving | Conceptual Blending | Creative Thinking | Thinking Patterns | Associations | Eureka Moment | Process of Incubation | Journals | Note-taking | Creative Ideas | Positions of Comfort | Revisiting Ideas |Navy seals
A great podcast with Kelly Dempsey of NIST covering Printers, Printer Security, Risks embedded windows 2000, embedded xp. printer service contracts, network takedown risk, DDOS, patching risk, monitoring risk, printer capability, overwriting, encryption, segmentation, non-volatile storage, port management, non-volatile storage confidentiality, risk management, printer lease agreement
Chuck Blakeman has built 8 businesses on 4 continents. He is the CEO of Crankset Group which helps businesses move from an Industrial Age to a Participation Age Company. In this episode you will learn how to move from an employee mentality to a stakeholder mindset and many other concepts for leaders and entrepreneurs.
Bob Fecteau is a Tier 1 CIO with SAIC. This episode reviews leadership vs management, being a financial expert, examples of owning problems, building CIOs, the skills needed to be a next gen CIO
Data Governance from core to edge. Smart alerting, file permissions, active directory, and other technical areas in IT Security monitoring with Big Data Security Analytics, HIPPA, and PCI. Reducing noise and getting to what matters for core IT security events with tools from Varonis.
In this episode with Davi Ottenheimer you are going to love learning more about Big Data Security and the challenges that CIOs face as well as the planet. The challenges that the IT profession and IT Security face are tough ones. We dive into many concepts related to why you can’t limit gathering data and at the same time expect to find security correlations between system systems or people. You will learn why De-Identification so important to understand with Big Data Security? And why it doesn’t work!
My discussion with Jean Gomes, Chairman of the Energy Project is a fascinating one. Jean works with some of the largest IT companies in the world like Google and Yahoo as well as Sony and other brands. We discuss how he teaches leaders of companies to build their latent capacities in today’s accelerating world. I am a huge believer in tapping our reserves of potentialThis show will change your perception on what you are capable of. This is not an episode about how to push the wheel faster or keep more plates spinning. The role of a leader today demands that we tap all of our reserves and capabilities so that we can pull off the good that we were destined to create. Our discussion is not about chasing how efficiently you can mow the lawn or plow the field. Today you need to have the mental agility to use the part of the brain that synthesizes and correlates, draws distinctions and unique relationships between things. You can’t do this if you are exhausted or depressed. We review cutting edge research on the topics of health, wellness, and neuroscience as it relates to optimal performance.
In this interview with Thycotic software’s CEO Jonathan Cogley it would be easy to have our discussion based solely on the success of his product and company. Thycotic has been on a tear dominating the password management space. What you will get from this interview is something of deeper value. We discuss Jonathan’s focus on Thycotic’s Unique Culture, Risk based CIO decision making, and key aspects of you network that you want to absolutely be in control of.
This interview was a lot of fun. Enterprises frequently buy security products with the best of intentions, but they end up being abandoned. Sometimes the product never makes it out of the box and into the rack. What factors contribute towards security shelfware and what can be done by both vendors and enterprises to avoid this happening? If it has happened how can you reverse it?What are the top security products that end up on the shelf or marginally used?
You are really going to enjoy my interview with Mark Robnett, CIO Justice Federal Credit Union. Mark is a rising star in the Credit Union industry and I asked him to detail for you in this episode how he put together his presentation to his board regarding his IT security strategy and tactics. I have found that Justice FCU is about 1-2 years ahead of Credit Unions of its size. I would put them on par with firms many times their size. Mark also has the added pressure of having a very smart and technically savvy board. There is no hiding behind jargon and complexity with them because the board is comprised of individuals with backgrounds in FBI and Justice Department. What a challenge!
Jack Jones is widely considered a thought leader in risk management and information security, Jack has been employed in technology for the past thirty years; specializing in information security and risk management for twenty-four of those years. During this time he has garnered a decade of experience as a CISO, including five years for a Fortune 100 financial services company. His work has also been recognized by his peers and the industry, earning him the 2006 ISSA Excellence in the Field of Security Practices award, and the 2012 CSO Compass Award for Leadership in Risk Management. Jack is the originator of the now industry standard risk management framework known as Factor Analysis of Information Risk (FAIR). FAIR has seen adoption globally, within organizations of all sizes, and is now regularly included in graduate-level university courses on information security and referenced by other industry standards. He also recently co-authored a book on FAIR entitled "Measuring and Managing Information Risk - A FAIR Approach".





