TechSperience Solutions

Connection.com

The world of technology is complex. Each episode of TechSperience will uncover helpful technology, cybersecurity, cloud, and workplace transformation tips to help the everyday IT professional. Tune in for advice from leading IT experts covering retail, manufacturing, healthcare, K-12, higher education, and more.

  1. OCT 30

    Episode 141: Navigating the Intersection of Data and AI – Building a Robust AI Strategy

    In this conversation, the speakers discuss the intersection of data strategy and AI strategy, emphasizing the importance of collaboration between different roles within the organization. They outline their 12-month plans for AI implementation, focusing on governance, risk management, and the challenges of data governance. The discussion also touches on the ownership of AI production systems and the principles that guide decision-making in the face of conflict. The speakers highlight the need for a balance between innovation and risk management, as well as the importance of maintaining strong partnerships within the organization. Show Notes: 00:00 Introduction to Data and AI Strategy 08:52 12-Month Plan for AI Implementation 17:45 Balancing Innovation and Risk Management 24:50 Data Governance and Security Challenges 27:21 Managing Shadow AI and Encouraging Innovation 28:46 Vision and Innovation: The Importance of Rechecking Paths 30:34 Navigating Customer Relationships and Risk Management 31:40 Understanding NPU Technology and Its Implications 34:09 Balancing AI Workloads: Cloud vs. Local Processing 35:31 Contractual Considerations in AI Partnerships 38:48 Ownership of AI Production Systems: A Collaborative Approach 43:29 Establishing Governance and Support Structures for AI 46:04 Defining Tiebreaker Principles in AI Decision-Making 50:07 Operationalizing Governance and Risk Management 51:55 Commitments to Innovation and Collaboration

    57 min
  2. JUL 8

    Episode 139: RSAC 2025 Unpacked - Expert Reactions from the CNXN Security Team

    In this episode of the Connection Cybersecurity Podcast, host Kim Coombes is joined by our Security Center of Excellence leaders John Chirillo and Rob Di Girolamo, along with Microsoft Security expert Robin Camirand, to unpack the biggest insights from the RSAC 2025 Conference. From the rise of AI-powered defenses and identity threats to the growing buzz around quantum computing, the team shares key takeaways, favorite moments, and what these trends mean for the future of cybersecurity. Whether you're curious about agentic AI, post-quantum cryptography, or just want to hear about goats and code-breaking shenanigans—this recap of the conference includes insights from our experts and has something for everyone. For more information on how to better secure your environment, visit Connection.com/Cybersecurity If you’re ready to start the conversation around what Connection can do to help your organization—Call 1.800.998.0067. Or, if you have a Connection account team already in place, please reach out. Speakers John Chirillo, Principal Security Architect, Connection Rob Di Girolamo, Senior Security Architect, Connection   Kimberlee Coombes, Security Solution Architect, Connection Robin Camirand, Inside Solution Architect, Connection    Show Notes 00:00 Welcome and Overview of RSAC 2025 02:27  Community and Collaboration at RSAC 04:39 Identity Management Challenges 07:58 Zero Trust Principles in Security 08:37 Quantum Computing and Post-Quantum Cryptography 10:20 Agentic AI in Security Operations 12:42 Emerging Defenses Against AI-Powered Attacks 14:48 Best Practices for Leveraging AI in Security 17:04 Favorite Moments from RSAC 2025 20:25 Summing Up RSAC 2025

    22 min
  3. MAY 5

    Episode 137: Quantum Computing Threats and Countermeasures

    Quantum computing represents a significant shift in computational power, offering both opportunities and challenges for securing sensitive data. Join the Connection Security Center of Excellence team as we delve into the transformative threats that quantum computing poses for cybersecurity and the countermeasures we should be considering to address those threats. We'll explore the fundamentals of quantum computing, including concepts like qubits, superposition, and entanglement, and how these principles can enhance encryption and threat detection. Quantum cryptography, quantum random number generation, and quantum machine learning are some of the promising applications that could revolutionize device security. However, quantum computing also poses risks to traditional cryptographic methods, potentially compromising data integrity, authentication protocols, and long-term data security. We'll discuss the need for quantum-resistant cryptographic algorithms and the importance of transitioning to quantum-safe technologies to protect against future quantum-enabled threats. Join us as we navigate the exciting yet complex landscape of quantum computing and security, highlighting the advancements, challenges, and future directions that will shape the approach to cybersecurity in the quantum era.  Speakers John Chirillo, Principal Security Architect, Connection Rob Di Girolamo, Senior Security Architect, Connection   Kimberlee Coombes, Security Solution Architect, Connection Lindsay Nelmes, Microsoft Solution Sales Executive, Connection Show Notes 00:00 Introduction to Quantum Computing and Cybersecurity 02:31 Real-World Impacts of Quantum Computing 04:49 The Timeline for Quantum Threats 06:29 Industries at Risk and Proactive Measures 08:36 Understanding Quantum Resistant Algorithms 09:59 Leveraging Quantum for Cybersecurity Improvements 12:08 AI and Quantum Computing Synergy 14:07 Microsoft's Role in Quantum Security 15:30 Future Milestones in Quantum Computing 18:02 Misconceptions About Quantum Computing 20:12 Final Thoughts and Takeaways For more information on how to better secure your environment, visit Connection.com/Cybersecurity.

    24 min

Ratings & Reviews

5
out of 5
6 Ratings

About

The world of technology is complex. Each episode of TechSperience will uncover helpful technology, cybersecurity, cloud, and workplace transformation tips to help the everyday IT professional. Tune in for advice from leading IT experts covering retail, manufacturing, healthcare, K-12, higher education, and more.