DiscoverUnscripted | David Raviv
Unscripted | David Raviv

Unscripted | David Raviv

Author: David Raviv

Subscribed: 1Played: 2
Share

Description

"Unscripted" is a podcast peeling back the tech and venture capital layers, offering a glimpse into the conversations shaping innovation's future. Hosted by David, each episode journeys through the minds of entrepreneurs and leaders, sharing unfiltered stories and insights. It covers venture capitalism, software development, and emerging technologies, emphasizing open dialogue for meaningful insights. Beyond a podcast, "Unscripted" is a thought leadership platform where tech and business minds share, inspire, and provoke, catering to founders, investors, and tech enthusiasts.
125 Episodes
Reverse
From SOC analyst to AI innovator: How Dylan Williams navigates the intersection of cybersecurity and artificial intelligence, revealing why he believes we're entering the age of 'LLM Kiddies' and what it means for the future of security operations. Synopsis: In this engaging conversation, cybersecurity expert Dylan Williams discusses his journey from traditional security operations to AI innovation, sharing invaluable insights on the transformation of cybersecurity through AI and LLMs. He explores the promises and pitfalls of AI in security operations, the emergence of AI-powered threats, and practical considerations for implementing AI in security workflows. Timeline: 0:00 - Introduction and welcome 0:35 - Dylan's background in security operations and blue teaming 2:00 - Transition from traditional security to AI/LLM specialization 3:44 - Early career journey and entering cybersecurity 4:14 - Discussion on curiosity in cybersecurity careers 5:46 - Modern learning resources and certification value 8:37 - Current state of AI adoption in cybersecurity 13:56 - Analysis of Microsoft Copilot and AI integration challenges 16:17 - AI as a junior analyst concept 20:32 - Discussion of current LLM limitations 24:44 - Analysis of SOC automation using AI agents 27:41 - Framework for evaluating AI implementation in security 30:24 - Importance of explainable AI in security 32:19 - Vendor integration of AI capabilities 35:18 - Discussion of adversarial use of AI 41:11 - Risks of AI monoculture in security tools 43:35 - Cost implications of AI in security operations 46:21 - Concerns about over-reliance on AI tools 51:08 - Data privacy concerns with public LLMs 54:33 - Closing thoughts and future projects 57:16 - Conclusion
In this conversation, David Raviv interviews Jamison Nesbitt, who shares insights from his extensive experience in cybersecurity and event management. They discuss the importance of events for information sharing among C-level executives, the challenges posed by ransomware and supply chain issues, and the role of regulation in ensuring accountability in critical infrastructure. Jamison emphasizes that collaboration and content-driven discussions are key to successful events, while also highlighting the need for organizations to be proactive in their cybersecurity measures. In this conversation, David Raviv and Jamison discuss the complexities of data privacy regulations like GDPR, the challenges of balancing airline costs with regulatory compliance, and the importance of cybersecurity investment. They explore the role of AI in cybersecurity, emphasizing the need for responsible use and the human element in innovation. The discussion also highlights the significance of engaging with cybersecurity events and communities to foster collaboration and awareness in critical infrastructure sectors. Chapters 00:00 Introduction and Background 03:06 The Importance of Events in Cybersecurity 05:46 Content is King: The Secret Sauce of Successful Events 09:09 C-Level Perspectives on Cybersecurity 11:56 Emerging Trends in Aviation Security 14:53 Ransomware and Supply Chain Challenges 17:44 The Role of Regulation in Cybersecurity 21:05 Accountability and Innovation in Critical Infrastructure 27:29 Navigating GDPR and Data Privacy 29:37 The Balancing Act of Airline Costs and Regulations 32:21 Cybersecurity Investment and ROI Challenges 35:46 Innovation in Cybersecurity: The Human Element 40:15 AI in Cybersecurity: Opportunities and Risks 48:43 Engaging with Cybersecurity Events and Communities
Join us in this engaging episode as we sit down with William Brinson to explore his fascinating journey in enterprise architecture, IT, and cybersecurity. Discover how his experiences from Pizza Hut to enterprise IT shaped his unique approach to technology. Dive deep into the transformative potential of AI and machine learning in modern business, uncovering practical insights on AI adoption, digital twins, and the future of digital assets. William shares invaluable advice for business owners on leveraging AI for efficiency, profitability, and staying competitive in an ever-evolving digital landscape. 00:00 Introduction and Guest Welcome 00:29 Journey into IT and Early Career 02:34 Enterprise IT and Business Processes 05:38 AI and Machine Learning in Business 09:01 Digital Transformation and Future Vision 16:09 Practical AI Applications for Businesses 26:09 Implementing AI for Immediate Impact 29:04 Harnessing AI for Marketing Automation 30:31 The Risks of AI Monoculture 31:24 The Influence of Social Media Algorithms 35:19 AI in Education and Workforce 42:27 The Future of Human-AI Interaction 48:06 AI in Business Strategy and Implementation 52:58 Conclusion and Final Thoughts
In this episode, James discusses the merits and vision behind decentralized societies and their contrast to centralized systems historically and in modern times. He shares his journey into the philosophy of decentralization, inspired by science fiction literature and particularly Neil Stevenson's 'Snow Crash'. The discussion delves into various societal institutions like education, religion, and government, highlighting how they have centralised control over time and how this affects individual freedom and choice. James also discusses the impacts of centralization on global economic disparity, exemplified by issues in the third world, and the potential of blockchain and decentralized technologies to redistribute power and wealth. The conversation also touches on AI, universal basic income, and personal freedoms in a decentralized context. 00:00 Introduction and Greetings 00:05 The Evolution of Decentralized Societies 01:00 Influence of Science Fiction on Decentralization 02:34 Historical Shift to Centralization 03:18 The Role of Institutions in Centralization 04:18 Critique of Centralized Systems 06:48 The Impact of Centralization on Global Issues 07:03 Decentralization and Blockchain Technology 11:06 Debate on Decentralization vs. Centralization 12:58 The Importance of Choice and Freedom 14:34 Challenges and Perspectives on Decentralization 15:48 The Role of Trust and Verification 16:57 Criticism of Legal and Financial Systems 18:49 Global Perspective on Systemic Flaws 29:53 Bitcoin and the Concept of Value 32:44 Decentralization as Freedom of Speech 36:01 Debunking Terrorism Funding Myths 37:47 AI Development Costs and Monetization 38:52 Economic Inequality and Investment Barriers 41:55 Decentralization and Universal Basic Income 47:40 The Future of Transactions and Bitcoin 54:46 AI's Role in Society and Potential Risks 01:01:04 Decentralized Systems and Global Power 01:03:25 Conclusion and Future Conversations #Decentralization, #Blockchain, #Bitcoin, #AI, #CentralizedPower, #FinancialFreedom, #Cryptocurrency, #SocialChange, #Democracy, #DigitalRights, #FreedomOfChoice, #Governance, #Metaverse, #Innovation, #DataPrivacy, #MonetaryPolicy, #GlobalEconomy, #TechnologicalChange, #SmartContracts, #DecentralizedAI
From ransomware attacks that ground flights to nation-state threats lurking in the shadows, the aviation industry faces unprecedented cybersecurity challenges. Join me for a conversation with Jamison Nesbitt, founder of the Cyber Senate, as they pull back the curtain on how aviation security leaders are working tirelessly to keep our skies safe while balancing innovation, regulation, and the constant push for cheaper tickets. Discover why collaboration and human ingenuity remain our best defense in an increasingly complex digital battleground. 00:00 Introduction with David Raviv and Jamison Nesbitt 03:27 The Secret Behind Successful Industry Events 09:51 Inside Aviation's Complex Security Web: Current Threats 16:46 When Things Go Wrong: Learning from the CrowdStrike Incident 23:00 Regulation vs Innovation: Finding the Right Balance 31:53 Following the Money: The Economics of Aviation Security 37:15 AI in Aviation: Promise and Peril 44:48 The Human Element: Unsung Heroes of Aviation Security 51:02 What's Next: Upcoming Events and Industry Outlook #AviationSecurity #Cybersecurity #CriticalInfrastructure #Innovation #TechTalks #Aviation #Security
From commanding tanks to revolutionizing customer feedback through AI, Guy Nirpaz's entrepreneurial journey shows how sometimes the best innovations come from questioning the status quo. Learn how his company Perspective AI is transforming the way businesses understand their stakeholders by replacing impersonal surveys with AI-powered conversations that achieve 90% completion rates and uncover insights that traditional methods miss. 00:00 Introduction & Background Early passions: coding, basketball, guitar. Military service as tank commander. Learning to manage people in challenging conditions. 03:04 Early Career Journey Joined IBM as Sales Engineer. Moved to Mercury as architect. Became VP Engineering at GigaSpaces. Notable colleagues included Elastic founder Shai Banon. 08:14 Entrepreneurial Mindset Discussion of nonconformist thinking. Importance of learning from failure. Building self-confidence through challenges. 22:57 Perspective AI Origin Story Problem: Limitations of traditional surveys. Solution: AI-powered conversations. Achievement: 90% completion rates. 34:41 How Perspective AI Works Natural conversation approach. Adaptive questioning. Real-time insights generation. No fixed questions like traditional surveys. 47:23 Target Users & Success Stories Startups to growth companies. Product teams. Marketing teams. Case study: Podcast doubling audience in 6 months. 54:49 Closing Thoughts Future of AI and human interaction. How to get started with Perspective AI. Contact information and next steps. #Entrepreneurship #AI #CustomerFeedback #StartupStory
Join cybersecurity executive Joe Schorr as he shares insights from his journey from penetration tester to strategic advisor, exploring how AI is reshaping security, the delicate balance of vendor relationships, and the future of cyber defense. Timeline: 0:00 Introduction and career evolution 2:00 The art of executive-level security consulting 5:00 Transitioning from CIO to strategic advisor 9:00 Building trust in cybersecurity relationships 15:00 AI's impact on security industry 25:00 Navigating modern security complexity 35:00 Security as business enablement 45:00 Evolution of security service providers 55:00 Future of security pricing models 1:05:00 Predictive security and risk assessment 1:14:00 Closing thoughts
Join cybersecurity executive Joe Schorr as he shares insights from his journey from penetration tester to strategic advisor, exploring how AI is reshaping security, the delicate balance of vendor relationships, and the future of cyber defense. In this captivating discussion, veteran cybersecurity executive Joe Schorr shares invaluable insights from his journey from hands-on penetration tester to high-level strategic advisor. The conversation explores the rapidly evolving cybersecurity landscape, particularly focusing on the impact of AI, the challenges of building trust in vendor relationships, and the future of risk quantification in cybersecurity. Timeline: 0:00 Introduction and career evolution 2:00 The art of executive-level security consulting 5:00 Transitioning from CIO to strategic advisor 9:00 Building trust in cybersecurity relationships 15:00 AI's impact on security industry 25:00 Navigating modern security complexity 35:00 Security as business enablement 45:00 Evolution of security service providers 55:00 Future of security pricing models 1:05:00 Predictive security and risk assessment 1:14:00 Closing thoughts #CyberLeadership #SecurityStrategy #AIinCybersecurity #CyberTrust #InfoSec #CISO #CyberRisk #SecuritySales #TrustedAdvisor #CyberDefense #RiskQuantification #CyberInnovation #SecurityVendors #CyberTransformation #FutureOfCyber
From CEO of cybersecurity pioneers to safeguarding the nation’s most critical communications, Gregg Smith shares his unique journey from mobile technology to cyber defense. Discover why, despite years of innovation, secure communication remains an unsolved puzzle—and how the race between security and interception is shaping the future of global cybersecurity. In this conversation, Gregg Smith shares his journey from the mobile industry to becoming a leader in cybersecurity. He discusses the critical intersection of mobility and cybersecurity, the ongoing challenges in securing mobile communications, and the importance of secure communication applications. Gregg emphasizes the need for enhanced security measures for executives and the complexities of implementing zero trust solutions in organizations. He also highlights the workforce shortage in cybersecurity and the importance of training the next generation of professionals. The conversation concludes with insights on community involvement and the role of nonprofits in advancing cybersecurity efforts. Chapters 00:00 Introduction to Cybersecurity Journey 02:46 The Intersection of Mobility and Cybersecurity 05:48 Challenges in Mobile Communication Security 09:07 The State of Secure Communication Apps 12:13 Enhancing Communication Security for Executives 14:58 Government Communication Security Practices 18:02 The Complexity of Cybersecurity Solutions 21:11 Implementing Zero Trust in Organizations 23:57 Protecting Critical Infrastructure 26:46 The Workforce Shortage in Cybersecurity 30:00 Training the Next Generation of Cybersecurity Professionals 32:50 Community Involvement and Philanthropy in Cybersecurity 36:12 The Role of Nonprofits in Cybersecurity 39:07 Advice for Small Vendors Seeking Government Contracts 41:57 Conclusion and Future Outlook
Summary In this conversation, Dr. Nestori Sinema discusses his extensive academic background and ongoing pursuit of knowledge in the field of cybersecurity. He shares insights on the importance of formal education versus certifications, the life of a vulnerability researcher, and the role of AI in cybersecurity. The conversation also touches on collaboration within the research community and offers advice for those looking to start a career in ethical hacking. Takeaways Continuous learning is essential in cybersecurity. Formal education provides a foundation, but certifications validate skills. Persistence is key to completing a PhD. AI can enhance vulnerability research but also introduces new challenges. Collaboration among researchers is vital for knowledge sharing. Ethical considerations are crucial in cybersecurity practices. Bug bounty programs can be lucrative for researchers. Networking at conferences can lead to valuable connections. Documenting findings helps others learn and replicate successes. The cybersecurity field is constantly evolving, requiring adaptability. Timeline: 00:00 - 03:44: Introduction and Dr. Syynimaa's educational background 03:45 - 06:24: Discussion on the drive behind pursuing multiple degrees and PhDs 06:25 - 09:57: Explanation of Microsoft's Most Valuable Researcher (MVR) designation 09:58 - 13:54: Insights into the process of finding vulnerabilities in software 13:55 - 18:47: Detailed explanation of how researchers manipulate software inputs to find bugs 18:48 - 22:31: Discussion on the potential role of AI in vulnerability research 22:32 - 28:26: The challenges of measuring success in security research 28:27 - 33:05: Bug bounty programs and the economics of vulnerability research 33:06 - 38:42: The ethics of hacking and the importance of responsible disclosure 38:43 - 43:14: Dr. Syynimaa's experience as a CIO managing large infrastructure 43:15 - 48:15: The collaborative nature of the security research community 48:16 - 55:00: Discussion on bug bounty payouts and full-time vulnerability hunting 55:01 - 59:26: Advice for aspiring security researchers and available resources 59:27 - 1:04:26: The balance between ethical hacking and black market vulnerability sales 1:04:27 - 1:07:17: Closing thoughts and contact information
In this conversation, Lemon Williams shares his journey from a failed career in trading to becoming a prominent figure in cybersecurity. He discusses the evolution of cybersecurity, the importance of understanding risk, and the role of emotional intelligence in decision-making. Williams emphasizes the significance of critical infrastructure and the challenges posed by legacy systems. He also explores the impact of AI and IoT on cybersecurity, advocating for a return to basic security principles while navigating the complexities of modern technology. Takeaways Lemon transitioned from trading to IT due to a lack of success in finance. Cybersecurity emerged as a critical field post-9/11, reshaping industry standards. Understanding risk is essential in both trading and cybersecurity. Emotional intelligence plays a crucial role in cybersecurity decision-making. Finding purpose in cybersecurity can stem from early experiences and contributions. Critical infrastructure is vital for national security and daily life. Legacy systems pose significant challenges to modern cybersecurity efforts. The future of operational technology is evolving with new security demands. AI presents both opportunities and threats in the cybersecurity landscape. Returning to basic security principles is essential in addressing new challenges. Chapters 00:00 From Trading to Cybersecurity: A Journey Unplanned 04:57 Understanding Risk: Lessons from Commodity Trading 09:49 The Evolution of Cybersecurity: A Growing Necessity 14:42 Critical Infrastructure: The Backbone of Society 19:33 Legacy Systems and Modern Challenges 24:43 The Impact of AI on Cybersecurity 29:29 Navigating the Internet of Things and Security 34:30 The Future of Cybersecurity: Balancing Innovation and Risk
Scott Nichols, a certified master resume writer turned pitch deck expert, shares his journey from the construction industry to helping job seekers and startups tell their stories effectively. In this insightful podcast, Scott reveals the secrets behind creating standout resumes and pitch decks, discussing the similarities between the two and offering valuable advice for both job seekers and startup founders. Learn about the art of strategic storytelling, the importance of personal branding, and how to capture the attention of recruiters and investors in today's competitive landscape. 00:00 Scott Nichols' Journey to Founding Velocity 02:51 The Evolution of Resume Writing 06:05 The Impact of AI on Resumes 08:58 Networking vs. Online Applications 11:47 The Resume Writing Competition 14:50 Transitioning to Pitch Decks 17:45 Crafting an Effective Pitch Deck 21:03 The Role of Team Dynamics in Startups 24:06 Navigating Complex Ideas in Pitch Decks 26:49 The Importance of Personal Branding 29:58 Onboarding and Working with Clients 32:58 Preparing for Pitch Presentations 35:58 Future of Pitch Writing and Certifications
Dive into an engaging conversation with Gene Yoo, CEO and founder of ReSecurity, as he shares his unique journey from IT professional to cybersecurity leader. Discover how his diverse career path, lessons from high-profile breaches, and a commitment to understanding business needs have shaped his approach to building a successful company. Explore the balance between technology and human-centric leadership, the impact of AI in cybersecurity, and practical advice for protecting organizations in an ever-evolving threat landscape. Whether you're a seasoned professional or new to the field, Gene's insights offer valuable perspectives on the intersection of business, technology, and security. Chapters 00:00 Journey to Founding Re-Security 04:54 The Importance of Interpersonal Skills in Cybersecurity 10:09 Navigating the Cybersecurity Landscape Post 9/11 15:11 The Role of National Security in Cybersecurity 20:04 Building Company Culture and Trust 25:06 Transitioning from IT to Executive Leadership 29:58 The Future of Cybersecurity and AI 35:06 Understanding Threats and Risk Management 39:53 The Human Element in Cybersecurity 44:51 Regulatory Pressures and Compliance in Cybersecurity
In this engaging conversation, David Raviv interviews Bill Totman, a seasoned cybersecurity professional. They discuss Bill's journey from early Linux days to becoming a sales engineer in the cybersecurity field. The conversation covers various aspects of the tech industry, including product development, sales strategies, and the challenges of staying ahead in a rapidly evolving field. Bill shares insightful anecdotes from his career, discussing the intricacies of network security, the importance of building relationships in sales, and the potential impact of AI on the industry. Timeline: 00:00 - Introduction and Bill's early career in technology 05:00 - Transition to cybersecurity and early experiences 15:00 - Discussion on the evolution of network security 25:00 - Sales engineering experiences and challenges 40:00 - Insights on product development and customer relationships 55:00 - Exploration of emerging technologies in cybersecurity 01:15 - Closing thoughts on AI and the future of sales engineering 01:30 - Conclusion #Cybersecurity #SalesEngineering #TechIndustry #NetworkSecurity #AI #ProductDevelopment #Linux #CareerJourney #TechnologyTrends #CustomerRelationships
Discover how Europe's trillion-dollar tech gap is reshaping global innovation and what it means for the future of AI and cloud computing. In this eye-opening episode, Fredrik Erixon , founder of the European Centre for International Political Economy, discusses the EU's significant underinvestment in cloud computing and AI technologies. He explores the reasons behind Europe's technological lag, the potential consequences for global competitiveness, and possible strategies for bridging the gap. Erixon offers unique insights into the challenges of implementing change in mature democracies and the importance of fostering innovation in a rapidly evolving technological landscape. Timeline: 00:00:00 - Introduction and Fredrik Erixon's background 00:09:00 - Discussion on technological change and its impact on society 00:20:00 - The challenges of implementing change in mature democracies 00:28:00 - Overview of the EU's trillion-dollar gap in ICT and cloud computing capacities 00:37:00 - The importance of AI adoption and its economic impact 00:45:00 - Cloud free trade approach and challenges for European cloud providers 00:52:00 - Future outlook and potential opportunities for European innovation 00:56:00 - Closing remarks and contact information
Discover how a former CIA operative transformed into a top-tier CISO, and learn the insider secrets to climbing the cybersecurity career ladder. In this enlightening podcast episode, host David Raviv interviews Ross Young, a seasoned cybersecurity expert with a fascinating background in intelligence agencies and corporate leadership. Ross shares his journey from the NSA and CIA to becoming a successful CISO, offering valuable insights into the evolving role of cybersecurity leaders. The conversation covers a wide range of topics, including the transition from government to private sector, the challenges of managing cybersecurity teams, and the importance of building relationships in the industry. Ross also discusses the ethical considerations for CISOs, the trend of virtual CISOs, and the potential impact of AI on the role. This episode is a must-listen for aspiring cybersecurity professionals and current leaders looking to enhance their skills and understanding of the field. Timelines: 0:00 - Introduction and background 7:24 - Transition from government to private sector 10:11 - Evolution from individual contributor to management 18:53 - The changing role of CISOs 29:26 - Enabling business through security 34:39 - Ethics and transparency in CISO roles 42:07 - Discussion on virtual CISOs 46:01 - The future of CISOs and AI 47:22 - Closing remarks and contact information
In this explosive podcast, cyber security expert Andy Jenkinson exposes the alarming vulnerabilities in our digital infrastructure, revealing how governments, tech giants, and cybercriminals are playing a dangerous game with our data and lives. Andy Jenkinson, a leading figure in cyber security, takes listeners on a chilling journey through the hidden dangers of our interconnected world. From NATO's cyber attack vulnerabilities to the shocking insecurities in critical infrastructure, Jenkinson unveils how digital certificates and DNS mismanagement are leaving us all exposed. He shares startling stories of government agencies, major corporations, and even nuclear facilities operating with gaping security holes. Jenkinson doesn't pull punches, calling out the complacency, incompetence, and sometimes willful ignorance of those tasked with protecting our digital assets. He exposes the conflicts of interest between tech giants, governments, and cybercriminals, painting a picture of a world where surveillance and profit often trump security. The conversation takes a sobering turn as Jenkinson discusses the implications of AI and quantum computing on cyber security, warning that we're repeating the same mistakes of prioritizing functionality over security. He leaves listeners with a stark message: our digital world is on fire, and unless we act now, the consequences could be catastrophic. Timelines: 00:00:00 - Introduction and background 00:07:10 - Explanation of digital certificates and PKI 00:26:33 - Discussion on DNS and internet security vulnerabilities 00:41:17 - Stories of government and corporate security failures 01:08:04 - Insights on surveillance and privacy issues 01:21:07 - The shift to cloud services and its security implications 01:25:10 - AI, quantum computing, and future cyber security challenges 01:33:53 - Closing remarks and contact information #cyber security #digital certificates #DNS #surveillance #AI #quantum computing #government agencies #tech giants #cybercrime #data privacy #critical infrastructure #insider trading #whistleblowing
Is AI really revolutionizing industries, or are we in the midst of another tech bubble? Dr. Jeffrey Funk, a technology expert with decades of experience, shares his contrarian views on the current AI hype and what it means for the future of innovation. In this eye-opening conversation, Dr. Jeffrey Funk, author of the upcoming book "The Hype Handbook: How to Separate Technology's Promises from Its Commercial Realities," discusses the current state of AI and tech innovation. Drawing from his extensive experience in technology assessment, Dr. Funk challenges popular narratives about AI's impact and offers a sobering perspective on the gap between promises and reality in the tech world. From the evolution of his views on technology to insights on research, startups, and the future of AI, this episode provides a thought-provoking look at the tech landscape. Timeline: 00:00 - Introduction and Dr. Funk's background 05:30 - The evolution from tech optimist to skeptic 10:45 - Discussion on AI hype and reality 15:30 - Insights on startup valuations and VC funding 22:15 - The state of innovation and research 30:00 - AI's potential impact on jobs and productivity 38:45 - Challenges in AI development and implementation 45:30 - The role of regulation in AI 52:00 - Future directions for AI and tech innovation 58:45 - Discussion of Dr. Funk's upcoming book 01:09:18 - Conclusion
From military communications to defending against cyber warfare, Dr. Georgianna (George) Shea reveals how our digital world is both more connected and more vulnerable than we realize. Discover the intricate world of cybersecurity with Dr. Georgianna Shea, a cybersecurity expert with a fascinating journey from Army communications specialist to critical infrastructure protection. In this eye-opening episode, Dr. Shea delves into the complexities of protecting our interconnected world, from the vulnerabilities in medical devices to the potential risks of artificial intelligence. Episode Timeline: 00:00 - 02:30: Introduction and Dr. Shea's background 02:31 - 08:00: Military experience and transition to civilian life 08:01 - 15:30: Dr. Shea's academic journey 15:31 - 22:00: Critical infrastructure and cybersecurity 22:01 - 28:30: Cyber warfare and geopolitical conflicts 28:31 - 34:00: Software Bill of Materials (SBOM) and device security 34:01 - 38:30: Artificial Intelligence and cybersecurity 38:31 - 45:00: Government policies and cybersecurity progress 45:01 - 50:00: AI and privacy concerns 50:01 - 55:00: Compliance regulations and government role 55:01 - 60:00: Positive developments in cybersecurity 60:01 - 61:24: Closing remarks and contact information
Join us for an insightful conversation with Kevin Sullivan, a seasoned IT professional with over a decade of experience in cloud computing and IT infrastructure. Kevin shares his fascinating journey from a childhood computer mishap to becoming a leading expert in cloud solutions. Discover how businesses can leverage cloud technology to enhance security, productivity, and cost-effectiveness in today's rapidly evolving IT landscape.Kevin offers valuable insights on desktop-as-a-service, unified communications, disaster recovery, and the future of cloud computing. Learn about the challenges and opportunities in modern IT infrastructure, including the impact of remote work, the importance of user experience, and the critical role of security in cloud environments. Episode Highlights: 0:00 - 5:00: Kevin's Tech Journey Learn how a childhood computer mishap sparked Kevin's passion for technology. 5:01 - 10:00: The Evolution of IT Explore the transition from on-premises to cloud solutions and the changing IT landscape. 10:01 - 15:00: Desktop-as-a-Service Explained Understand the benefits and challenges of implementing DaaS in your organization. 15:01 - 20:00: The Importance of Unified Communications Discover how integrating communication tools can boost productivity and user experience. 20:01 - 25:00: Security in the Cloud Era Learn about the security implications of cloud adoption and best practices for protection. 25:01 - 30:00: Disaster Recovery and Business Continuity Explore why a solid recovery plan is crucial for modern businesses. 30:01 - 35:00: The Future of Cloud Computing Hear Kevin's predictions on upcoming trends and technologies in the cloud space. 35:01 - 40:00: Practical Tips for IT Decision Makers Get actionable advice on how to approach cloud adoption and optimization. 40:01 - 45:00: The Human Side of Technology Kevin shares how his background in music influences his approach to IT solutions. 45:01 - 50:00: Closing Thoughts and Resources Learn how to connect with Kevin and Evolve IP for further assistance with cloud solutions.
loading
Comments