23 episodes

A war between cybercriminals and businesses is raging. The global pandemic only served to increase the volume of hacked and breached data. As everyone began working from home everyday resources like mobile phones and IoT devices became targets. In fact, data breaches exposed over 36 billion records in the first half of 2020 alone according to RiskBased.Additionally, recent security research suggests most companies have unprotected data and poor cybersecurity practices in place, making them vulnerable to data loss. This has them investing in cybersecurity technology like never before. In fact, Gartner projects the worldwide information security market will reach $170 billion by next year.As the world’s leading end-to-end technology distributor, Tech Data plays a key role in the cybersecurity supply chain. This puts the company right in the middle of the action, sitting between strategic vendors building defense technology and the troops in the field working with companies to prevent security breaches. Tech Data’s point person for security is Tracy Holtz, Vice President, Security Solutions, Americas. “The Holtz Story” is where Tracy shares what she is hearing from both the security vendor’s and channel partner’s perspectives. Hear Tracy and her guests discuss threat levels, specific threats, and what strategic vendors and businesses are doing right now to adapt to the rapidly evolving threat landscape.

The Holtz Story Tracy Holtz

    • Business
    • 5.0 • 1 Rating

A war between cybercriminals and businesses is raging. The global pandemic only served to increase the volume of hacked and breached data. As everyone began working from home everyday resources like mobile phones and IoT devices became targets. In fact, data breaches exposed over 36 billion records in the first half of 2020 alone according to RiskBased.Additionally, recent security research suggests most companies have unprotected data and poor cybersecurity practices in place, making them vulnerable to data loss. This has them investing in cybersecurity technology like never before. In fact, Gartner projects the worldwide information security market will reach $170 billion by next year.As the world’s leading end-to-end technology distributor, Tech Data plays a key role in the cybersecurity supply chain. This puts the company right in the middle of the action, sitting between strategic vendors building defense technology and the troops in the field working with companies to prevent security breaches. Tech Data’s point person for security is Tracy Holtz, Vice President, Security Solutions, Americas. “The Holtz Story” is where Tracy shares what she is hearing from both the security vendor’s and channel partner’s perspectives. Hear Tracy and her guests discuss threat levels, specific threats, and what strategic vendors and businesses are doing right now to adapt to the rapidly evolving threat landscape.

    Introducing Trellix & Discussing Cybersecurity Trends

    Introducing Trellix & Discussing Cybersecurity Trends

    In this episode of the Holtz Story, Britt Norwood, SVP of global channels and commercial at Trellix, discusses the latest trends in cybersecurity threats.
    The podcast opens with a discussion about the driving force behind the recent influx of ransomware attacks. The ransomware attack in Ukraine is one of the most recent incidents. Norwood indicates we’re already seeing copycat attacks, and the pervasiveness of ransomware is only getting worse.
    Customers are desperate for new ways to detect breaches before they enter their business. Customers know attacks will continue, and compliance isn’t the only path forward. Addressing emerging threats is made even more difficult by the skills shortage in cybersecurity and not having enough people to troubleshoot and automate detection and response.
    The conversation then shifts towards Trellix, the merging of McAfee and FireEye, how it came together, and what it means to customers. Norwood indicates it is going to be about learning and adapting (bringing together AI & ML), being native and open, and using the telemetry of a billion sensors to identify threats faster and more intelligently.
    We hope you enjoy the show. Please share it with colleagues and remember to subscribe using your favorite podcast platform (I.e., iTunes, Stitcher, Spotify, Google Podcasts, etc.).

    • 17 min
    Trends in Cybersecurity Threats and Solutions

    Trends in Cybersecurity Threats and Solutions

    On this episode of the Holtz Story, Tanja Omeragic, Technical Sales Manager and cybersecurity subject matter expert at ConnectWise, joins the Holtz Story to discuss the latest trends in cybersecurity threats and solutions. 
    A staggering 72% of MSPs report security incidents with clients, and cybercriminals are now targeting MSPs to reach their customers. These “Buffalo Jump Attacks” are causing MSPs to heighten their security knowledge and spend more time focusing on security. 
    The conversation then shifts towards remote workers and the increased risk of data breaches with this new level of work flexibility. Tanja explains that it is essential for many IT professionals to keep up patch management, keep an inventory and keep up with vendors to combat these risks. Tanja then discusses ConnectWise’s CRU (Cyber Research Unit) as a solution for end customers. 
    The conversation moves to cloud integration and cloud solutions. Tanja explains the need for full transparency. Security is not simply one solution but rather a team sport consisting of education, risk assessment, and visibility. She describes some changes that ConnectWise has made in regards to cloud security. 
    The conversation ends with a discussion about EDR and the need for education around EDR. Tanja discusses a solution of coupling EDR with a SOC service and bringing it to the SMB market. She dives further into education about endpoint security.
    We hope you enjoy the show. Please share it with colleagues and remember to subscribe using your favorite podcast platform (I.e., iTunes, Stitcher, Spotify, Google Podcasts, etc.).

    • 28 min
    Building Security Using SASE and Zero Trust

    Building Security Using SASE and Zero Trust

    Sunil Choudrie, Product Marketing lead (DLP and Email) at  Broadcom Software and part of Symantec’s global information protection practice, joins the Holtz Story to discuss the latest attack vectors. 
    The podcast opens up with a discussion about changes in the industry and what has been learned throughout the pandemic. Sunil shares how the pandemic has caused many organizations to move to the cloud from on-premises and some of the challenges faced. Employees are leaving offices and taking data with them. According to a recent survey by Enterprise Strategy Group (ESG), about 1/3 of staff will be working in the office full time in the “new normal.” 
    The conversation then shifts towards building cloud security by adopting SASE and Zero-Trust elements. Sunil explains SASE and where it fits. He discusses the meaning of Zero-Trust and why we may see Zero-Trust and SASE potentially replacing VPNs.  
    The conversation ends with a discussion about how Symantec plans to utilize SASE and Zero-Trust with customers. Sunil discusses the recent launch of the Symantec Enterprise Cloud Platform, which brings together the principles of SASE and Zero-Trust.
    We hope you enjoy the show. If you do, please share it with colleagues and remember to subscribe using your favorite podcast platform (i.e., iTunes, Stitcher, Spotify, Google Podcasts, etc.).

    • 28 min
    Protecting What’s Now & What’s Next

    Protecting What’s Now & What’s Next

    Frank Lento, Managing Director in Cisco’s Global Security Sales Organization and Global Head of the Global Security Sales Partner at Cisco joins The Holtz Story to discuss the latest solutions in cloud cybersecurity. 
    This podcast opens with a discussion of the change from looking at cybersecurity as a technology stack to seeing it more as a strategy. The conversation then shifts to how attack vectors are changing due to the change in the way we work. 
    Companies are now looking at architectures such as SASE to address new exposure planes. Traditionally, architectures only had to deal with a single-threaded backhaul, the data center. Now we have multiple access points to connect to the Internet or to the corporate environment.
    We've moved from business continuity to business resiliency environment. Even if the environment is up and running, it needs to be secure and protected. Business Continuity focused on VPN, MFA, and firewall. Where business resiliency is now focusing on the platform of architecture in total.
    The discussion shifts to Zero Trust which has heightened visibility due to the threat attack vectors that are out there today. Protecting a business requires a more comprehensive security platform, so the focus is on continual trust. Frank adds that we see customers moving to have that secure environment across the entire architecture, not just individual points within it.
    Frank shares how the Cisco security portfolio is evolving to ensure a comprehensive security architecture and solution set. He discusses acquisitions and shares Cisco’s focus on four key areas: network, user endpoint, cloud edge, and application. 
    The conversation concludes with Frank and Tracy discussing how Cisco and Tech Data are working together to make sure partners and customers deal with the necessity for a strong security posture, and how they enable partners to be knowledgeable and sell across the entire platform.
    We hope you enjoy the show. If you do, please share it with colleagues and remember to subscribe using your favorite podcast platform (i.e., iTunes, Stitcher, Spotify, Google Play, etc.).

    • 27 min
    Protecting Your People, Data, and Infrastructure with Zero Trust

    Protecting Your People, Data, and Infrastructure with Zero Trust

    Paul Mezzera, Vice President of Strategy at Saviynt, joins The Holtz Story to discuss protecting your people, data, and infrastructure with Zero Trust. 

    This episode opens with a discussion on the future of Identity Management (IM). Paul points out that there are too many devices and files to have people looking at logs. We now need machine learning to figure out what people need, want and have the rights to access. 
     
     As the conversation shifts to Zero-Trust, Paul discusses that it’s not a one-time solution or project, but more of a mindset of questioning access. Tracy and Paul discuss how you always need to be revisiting access rights, understand your risk and focus on high-value opportunities.
     
     The conversation touches on the skills gap, and the need to get more business skills involved in IM and security. IM relies on people who can interface with other people within an organization.

    As the discussion turns to the future of Saviynt, Paul says he sees the company focusing on enablement: making configurations and workflows easier to get up and running to show value quicker, making the UX more business-friendly and processing information with machine learning. 
     
    We hope you enjoy the show. If you do, please share it with colleagues and remember to subscribe using your favorite podcast platform (i.e., iTunes, Stitcher, Spotify, Google Play, etc.).

    • 27 min
    IBM on Security with William Crane

    IBM on Security with William Crane

    William “Chip” Crane, Cybersecurity Executive Advisor Public and Federal Markets at IBM, joins The Holtz Story to discuss IBM’s security activities and solutions.
    This podcast starts with a discussion around finding the balance between having the right data, questions, and tools. This leads to a discussion about IBM Cloud Pack for Security, and Chip provides an excellent executive overview of how it came together and integrates with other solutions in the market.
    The conversation transitions to IBM’s AI and ML initiatives. Chip discusses how they started with Watson Security and then took MSSP threat intelligence feeds from the X-Force research labs. They’re now seeing over 75 billion events per day, which require AI and enable rapid learning. 
    Like most of today’s cybersecurity conversations, we touch on Zero Trust. Chip shares how IBM does a workshop on Zero Trust, helping executives identify what it is and what needs to be done. Customers usually start with a lot of the components in place, and the workshop helps them identify and plan to fill the gaps.
    The podcast concludes with a discussion of Cyber Ranges and how both Tech Data and IBM have made big investments in this area. The Cyber Ranges allow customers to learn and react from a real threat experience.
    We hope you enjoy the show. If you do, please share it with colleagues and remember to subscribe using your favorite podcast platform (I.e., iTunes, Stitcher, Spotify, Google Podcasts, etc.).

    • 33 min

Customer Reviews

5.0 out of 5
1 Rating

1 Rating

Top Podcasts In Business

Ramsey Network
iHeartPodcasts
NPR
Pushkin Industries
Jocko DEFCOR Network
Andy Frisella #100to0