This is the fourth episode in the IT Security Series. Check out the rest of the series: Buzzkill E12 – What is security? Buzzkill E13 – PERSEC with Liam Cleary Buzzkill E14 – Identity Management with Stephanie Donahue Buzzkill E15 – Intersection of Privacy & Security with Dana Simberkoff [ THIS EPISODE ] This episode, we had… Continue Reading →
This week on Buzzkill we talk about Identity Management and its relationship to the modern IT infrastructure with we Stephanie Donahue – a Microsoft MVP and Regional Director and the President at PAIT Group. This conversation is an excellent summary of Identity security and how things have changed, especially with a transition to the cloud.
This week on buzzkill, we continue the IT Security Series with Liam Cleary, talking about Personal Security and how it relates to not only the security of yourself and your family but your organization’s data. We hope you enjoy this conversation as we traverse everything from wifi to social media and relate it all to the many important tools and techniques your organization should take advantage.
On the heels of the global breach using SolarWinds, we decided this would be a good time to bring Security to Buzzkill. In this episode Hunter and Jay provide an introduction to our IT Security Series. As we explore the topic, we will talk to ACTUAL security experts about why it is so important to plan for security, not only as an IT professional or programmer, but as an individual.
In this episode, we spoke with Amie Seisay about considerations organizations should have when building their IT teams. We had a great time exploring some of the reasons why, when it comes to strategy, communication, change management and other aspects of project implementation, having a diverse team is essential. We all agreed organizations really need more than developers and administrators to get things done. Training, communication and project management skills are fundamentally necessary in getting things done!
This week on Buzzkill, Jay and Hunter discuss what it means to successfully roll out technology in today’s climate. We discuss traditional IT success criteria, budget and time, but then dig into adoption and value. We posit that a modern IT rollout must consider adoption and value across the entire project, from planning through implementation to training and metrics.
This episode explores important aspects of communication, including how communication between IT and the organization is vital both to implementations and ongoing operations.
Though the stereotype of the cynical, introverted and sheltered IT admin may have some legitimacy, there are increasingly many kinds of people IT. Though this means there may be more sociality and better communication skills among IT members than in years past, it’s still very important to hone in on and improve IT communication skills on a regular basis.
Over the last two weeks Hunter and I had conversations with two people from very different backgrounds to help showcase the need for, but also the value of developing customer feedback loops in your engagements. Maxine Teller of Maximize Strategies shared her experiences supporting customer journeys with change. Samit Saini shared his own journey from the end user to the service adoption specialist.
It’s a regular struggle between end users and the IT shop: features versus security (and budget, and time, and actual value vs perceived value). The list is actually a lot longer than that, but the general point is this: end users, the drivers for mission success, often feel as though the technical solutions provided to them miss the mark and your Information Technology team feels as though end users don’t understand the unrealistic burden being put on IT to support the business. Sound familiar?
In this conversation Hunter and Jay discuss the Shadow IT problem and provide strategies for combatting it – but the focus isn’t on simply locking down your network, it’s understanding the problem and providing solutions that remove the symptoms causing it.
This week Hunter and Jay enter the world of Information Management and Information Architecture. Information Management and Information Architecture are key components to the usability of an information system – IM helps you know the processes for managing tacit knowledge, documenting it as elicit knowledge, and finally recording it as authoritative, or records. IA is all about how your people FIND that information, how it’s organized. To aid in the conversation, Jay and Hunter are very thankful to have solution architects Erin Glenn and Matt Barns to join us and tell their stories.