52 episodes

This podcast is for business leaders and technology experts who like to stay on top of the latest security news and listen to interviews with insightful industry leaders. Episodes will be a combination of two different formats. We’ll be featuring Coffee Break length podcasts inspired by our monthly webinar series, Envision IT Coffee Breaks, where we take a deep dive into technology hot topics. We’ll build upon that month’s webinar topic by interviewing a Subject Matter Expert to gain even more perspective. Separately, our Espresso Shots will be short, impactful podcasts focused on all things security. As business leaders and technology experts we have to recognize the increasing importance of IT security in the rapidly changing technology landscape.

Geek Speak - Tech Talks with Envision IT Envision IT

    • Technology
    • 5.0 • 3 Ratings

This podcast is for business leaders and technology experts who like to stay on top of the latest security news and listen to interviews with insightful industry leaders. Episodes will be a combination of two different formats. We’ll be featuring Coffee Break length podcasts inspired by our monthly webinar series, Envision IT Coffee Breaks, where we take a deep dive into technology hot topics. We’ll build upon that month’s webinar topic by interviewing a Subject Matter Expert to gain even more perspective. Separately, our Espresso Shots will be short, impactful podcasts focused on all things security. As business leaders and technology experts we have to recognize the increasing importance of IT security in the rapidly changing technology landscape.

    Episode 52: Top Ten Cybersecurity Misconfigurations: Poor Patch Management

    Episode 52: Top Ten Cybersecurity Misconfigurations: Poor Patch Management

    Join us over the next ten weeks as we discuss the top ten cybersecurity misconfigurations and review ways you can keep your organization safe from cyberattacks! In this episode we'll discuss one of the ten ways: Poor Patch Management. Implementing proper patch management is an important step to keeping your information safe from bad actors
     
    Connect with us:
    https://www.linkedin.com/company/envisionitllc 
    marketing@envisionitllc.com

    • 4 min
    Episode 51: Top Ten Cybersecurity Misconfigurations: Lack of Network Segmentation

    Episode 51: Top Ten Cybersecurity Misconfigurations: Lack of Network Segmentation

    Join us over the next ten weeks as we discuss the top ten cybersecurity misconfigurations and review ways you can keep your organization safe from cyberattacks! In this episode we'll discuss one of the ten ways: Lack of Network Segmentation. Having proper security boundaries within a network is a vital step to keeping your information safe from bad actors. 

    Connect with us:
    https://www.linkedin.com/company/envisionitllc
    marketing@envisionitllc.com

    • 6 min
    Episode 50: Top Ten Cybersecurity Misconfigurations: Insufficient Internal Network Monitoring

    Episode 50: Top Ten Cybersecurity Misconfigurations: Insufficient Internal Network Monitoring

    Join us over the next ten weeks as we discuss the top ten cybersecurity misconfigurations and review ways you can keep your organization safe from cyberattacks! In this episode we'll discuss one of the ten ways: Insufficient Internal Network Monitoring. Insufficient internal network monitoring plays an important role to detecting threats in order to help keep you and your employees safe from cyber-attacks. 
     
    Connect with us:
    https://www.linkedin.com/company/envisionitllc
    marketing@envisionitllc.com  

    • 3 min
    Episode 49: Top Ten Cybersecurity Misconfigurations: Improper Separation of User and Administrator Privilege

    Episode 49: Top Ten Cybersecurity Misconfigurations: Improper Separation of User and Administrator Privilege

    Join us over the next ten weeks as we discuss the top ten cybersecurity misconfigurations and review ways you can keep your organization safe from cyberattacks! In this episode we'll discuss one of the ten ways: Improper Separation of User and Administrator Privilege. Separating your accounts is an important way to help keep your information safe.
     
    Connect with us:
    https://www.linkedin.com/company/envisionitllc
    marketing@envisionitllc.com  

    • 4 min
    Episode 48: Top Ten Cybersecurity Misconfigurations: Default Configurations of Software and Applications.

    Episode 48: Top Ten Cybersecurity Misconfigurations: Default Configurations of Software and Applications.

    Join us over the next ten weeks as we discuss the top ten cybersecurity misconfigurations and review ways you can keep your organization safe from cyberattacks! In this episode we'll discuss one of the ten ways: Default Configurations of Software and Applications. 
    Connect with us:
    https://www.linkedin.com/company/envisionitllc
    marketing@envisionitllc.com  

    • 9 min
    Episode 47: Top Ten Cybersecurity Misconfigurations: Intro

    Episode 47: Top Ten Cybersecurity Misconfigurations: Intro

    Join us over the next ten weeks as we discuss the top ten cybersecurity misconfigurations and review ways you can keep your organization safe from cyberattacks!
     
    Connect with us:
    https://www.linkedin.com/company/envisionitllc
    marketing@envisionitllc.com  

    • 1 min

Customer Reviews

5.0 out of 5
3 Ratings

3 Ratings

Top Podcasts In Technology

Lex Fridman Podcast
Lex Fridman
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
No Priors: Artificial Intelligence | Machine Learning | Technology | Startups
Conviction | Pod People
Acquired
Ben Gilbert and David Rosenthal
BG2Pod with Brad Gerstner and Bill Gurley
BG2Pod
Hard Fork
The New York Times