Microsoft Azure for Corporate Wellness
February 20, 2020
Robert Smith is the founder & CEO of Fan Health Network which provides enterprises with turnkey well-being programs, including fun challenges. They connect you directly to professional athletes, sports personalities, and celebrities who want you to improve your fitness, diet, and well-being.
Robert is also a Fox Sports Analyst and Former NFL Running back.
Narinder Makin is the founder and CEO of Healthper USA, a company that offers an engagement services platform that is used to create well-being programs and digital interventions. Healthper is the underlying platform on which the Fan Health Network programs are built on top of.
Narinder is a technologist and Innovator with a deep passion to solve problems for the masses.
Connect With Robert:
Connect with Narinder:
[01:26] Avrohom: Employer wellness programs are on the rise, with an average cost of $742 per employee, per year, according to a 2017 survey conducted by UnitedHealthcare. What are the drivers behind the growing trend of employer wellness programs?
[02:26] Avrohom: What are the challenges faced by companies looking to offer employer wellness programs?
Robert: Either you are just checking out whether to have a wellness solution or are coming from an existing well-being offering that had an anemic engagement or looking to extend a current well-being offering, we cover it all.
You can start with HUDDLE where you engage with the celebrities including Hollywood, TV and Sports personalities, and run a holistic challenge like Find Your Purpose & Get Moving or a Take a Hike Step Challenge that can be run independently or co-exist with your existing solution.
You can mature to a HEALTHY YOU program that includes personalization and complete program customization with challenges, coaching, branding, and incentives.
[12:49] Where did this idea, for Fan Health Network, come from?
[14:39] How has partnering with Microsoft helped you grow and scale your business?
[17:54] Avrohom: There is definitely a huge emphasis, nowadays, on healthy living as evidenced by the growing market on wearable technologies; which, according to a recent report by PRNewswire, is estimated to reach a market size of over $57M by the end of 2022. Besides corporate wellness, where else do you see Fan Health Network playing a role in the overall healthy living marketplace?
Robert: Fan Health Network envisions not only to increase the participation in device reported data through its integrated experience but also sustain the engagement through its rich influencer network and incentive capability.
At Fan Health, we believe that our engagement capabilities promote device adoption in workplace populations. It also drives to increase data collection for patient engagement solutions that are either Digital Therapeutics Interventions or Provider backed interventions.
[20:21] Avrohom: How do people connect with you?
Narinder: You can go to Microsoft’s App Source or Azure Marketplace and search for Fan Health Network to get started with your well-being solution within moments.
Links to Azure Market Place:
1. Take A Hike Challenge https://azuremarketplace.microsoft.co...
2. Healthy You https://azuremarketplace.microsoft.co...
3. Find Your Purpose & Get Moving Challenge https://azuremarketplace.microsoft.co...
4. HUDDLE https://azuremarketplace.microsoft.co...
You can visit our website www.fanhealthnetwork.com or email us at email@example.com for more information.
[21:35] Do you have any parting words of wisdom to share with the audience?
You can listen to this episode on Sound Cloud as a podcast: https://soundcloud.com/asktheceopodca...
Tags: AI, Digital Disruption, Healthtech, Health and Wellness
IT Infrastructure Spending With Misha Rangel
January 30, 2020
Misha Rangel, the Senior Product Marketing Manager for IBM to share shared her insights on a recent IT Infrastructure spending study that was conducted by Forrester Research on behalf of IBM Systems.
The study can be accessed here: ibm.biz/Avrohom-HMC-Study
One of the key findings mentioned in the report is that on-premises solutions continue to play a key role in IT Infrastructure spending decisions, with 90% of IT decision-makers agreeing that on-premises infrastructure is a critical part of their hybrid cloud strategies.
Another key finding of the report is that IT decision-makers anticipate that more than half of mission-critical workloads and 47% of data-intensive workloads will be run either on-premises or in an internal private cloud within the next two years. This does not mean that organizations have stopped investing in on-premises. Misha goes into this topic in greater detail during our discussion.
Another key finding is that companies that delay IT Infrastructure upgrades are opening themselves up to serious vulnerabilities.
Misha Rangel has spent 13+ years as a product marketing leader for B2B technology companies.
[00:34] IBM just published the findings of an IT Infrastructure study conducted by Forrester Research. Can you help us understand, what are the current trends for IT Infrastructure spending?
[01:44] What’s driving the conversations around IT Infrastructure refresh?
[03:13] As you know, many companies are delaying upgrading their infrastructure, for various reasons. Be it budget cuts, lack of resources, or something else. What are the ramifications to delaying an infrastructure upgrade?
[03:13] Companies that delay IT Infrastructure upgrades are opening themselves up to serious vulnerabilities.
[04:54] Security doesn’t stop at the software level. Hardware has a security component, as well.
[05:21] One of the things the Forrester study talks about is that we’re seeing growth in Public Cloud spending across all types of workloads. Does this also refer to mission-critical workloads, or are there any kind of workloads where, perhaps, an on-prem or a hybrid cloud configuration might be a better choice?
[10:25] Where can people go to learn more about the Forrester IT Infrastructure study?
[11:02] How do people connect with you?
[11:36] Do you have any parting words of wisdom to share with the audience?
[11:40] Being consistent with IT Infrastructure refreshes can make a big difference with regards to preventing risks and threats to a company.
[12:17] Maintaining consistent IT Infrastructure refreshes is like going for an annual checkup at your doctor.
Tags: Cloud, Cybersecurity, Digital Transformation
Diversity and Inclusion with Debra Ruh
January 21, 2020
Debra Ruh is a Global Disability Inclusion Strategist, Market Influencer, internationally recognized keynote speaker, published author, branding expert, successful entrepreneur, and an exceptional mother. She is the host of the popular program: Human Potential at Work.
[00:43] We are at the cusp of the mainstream adoption of 5G, which will enable us to massively scale up our install base of connected devices. When thinking about IoT, there will be so many applications for Smart Homes, Smart Industries, and Smart Cities. This also means that there will be lots of competition for IoT manufacturers (and this is not necessarily limited to the field of IoT), which means that they have to really understand what their customers want, and HOW they’re using their products, in order to stay ahead of the game. What are the challenges that manufacturers have about understanding how people use their products?
[01:23] Many manufacturers assume one size fits all.
[01:23] Listening to your customers about how they use your technology gives you a competitive edge in the marketplace.
[05:35] How do Diversity and Inclusion apply to Autonomous Vehicles?
[07:05] Technologies like autonomous vehicles enable seniors and people with disabilities greater independence.
[07:05] One of the key benefits emerging technologies offers seniors is the freedom to age in place, on their own terms.
[08:52] How can technology help seniors and people with disabilities?
[09:00] Smart Home technology enables people with disabilities to live independently while keeping them safe.
[12:30] Smart Home technology can ensure that seniors are taking their pills!
[14:27] Emerging Technologies, such as Autonomous Vehicles and Smart Homes, can give seniors back their independence and dignity.
[15:49] CyberSecurity and hacking are topics that dominate today’s social media discussions. Can you help us understand, what are the CyberSecurity challenges for seniors and people with disabilities?
[21:07] How can we protect seniors and people with disabilities from online predators?
[21:07] A great resource to educate seniors about the Cybersecurity pitfalls of the online world is Scott Schober’s book, CyberSecurity is Everybody’s Business.
[21:07] The world is changing so fast that we have to keep educating ourselves about the latest technologies.
[22:00] Jack Ma, Founder of Alibaba once said: “Today, making money is very simple. But making sustainable money while being responsible to the society and improving the world is very difficult.” As the world is changing, what obligations do corporations have to show that they care more about people than profits?
[22:36] Many corporations are realizing that Tech For Good and complying with the United Nation’s Sustainable Development Goals (SDGs) can also be good for profits.
[24:35] Younger generations have vowed that they won’t do business with companies that don’t make a difference in the world.
[25:53] Diversity and Inclusion is good for profits!
[26:04] By valuing Diversity and Inclusion you turn your employees into your most vocal fans.
[26:11] Mattel programmed Barbie with AI to speak to girls about employment options. Unfortunately, things did not go as planned when Barbie told girls to choose careers in Fashion, as opposed to becoming a computer scientist! It turns out that they programmed their programmer’s inherent biases into the AI.
[29:00] How do people connect with you?
[30:09] Do you have any parting words of wisdom to share with the audience?
[34:42] We have to care about all people. We need to understand what it means to be human, and how do we celebrate that.
Tags: Cybersecurity, Autonomous Vehicles, Diversity and Inclusion
Cloud Migrations With Tina Gravel
December 26, 2019
Tina Gravel is the Senior Vice President of Channels and Alliances at Cyxtera Technologies, where she helps businesses migrate their mission-critical applications to The Cloud. She is an award-winning executive with more than 25 years of experience in the IT outsourcing, cloud, security and SaaS industries.
[01:09] Cloud is becoming more prevalent in the Enterprise space, with companies migrating more of their mission-critical applications to The Cloud. One of the more recent buzzwords permeating today’s vernacular is Hybrid Cloud. What does Hybrid Cloud really mean?
[02:47] What are the considerations businesses need to have when thinking about moving their mission-critical applications to The Cloud?
[03:53] A critical requirement for mission-critical applications is uptime. After all, you can’t have a global bank just go offline during a stock trade! One of the inherent benefits of migrating to The Cloud is the Service Level Agreement for guaranteed uptime. Many providers use a term called five 9’s of reliability. IBM just launched the z15 mainframe platform which offers seven 9’s. What do all these 9’s mean, and why are they important to businesses?
[05:24] The more 9’s you have, the more expensive it is!
[05:24] With regards to Cloud migrations, you need to balance the service level you want, with what you can afford to pay for.
[07:03] How does Cyxtera help businesses with their Cloud migrations?
[10:44] It’s no question that Cloud is the way to go for Enterprises that are launching brand new mission-critical applications. However, in the real world, the playing field is not so cut and dry. Let’s say, for example, that one of your core business applications is a COBOL program, which resides on a server in a backroom closet and stores its data in a huge flat file. First of all, how do you even begin to “cloud-enable” this ancient application along with its archaic flat-file database? The second challenge is that for that last 50 years no one has had to worry about cybersecurity. The application is running on a server in a secure location, and no one has access to it. As soon as this crucial and sensitive application moves to the cloud, suddenly, you have a new problem to worry about! Is it even worth it?
[13:33] What is Zero Trust?
[15:57] When migrating to The Cloud, make sure to only provide access to people who absolutely need it.
[17:49] How do people connect with you?
[18:17] Do you have any parting words of wisdom to share with the audience?
Tags: Cloud, Cybersecurity, Digital Transformation
Deep Tech with Avrohom Gottheil
December 17, 2019
We are living in an era of information overload, where there is an overabundance of information, yet at the same time, it’s hard to ascertain what’s credible and what’s not. Technology changes rapidly, and innovation is on the rise. How can we educate ourselves to know:
(1) What products are available on the market?
(2) What solutions to search for?
(3) Which technology trends will be long-lasting, and which ones will become fads?
This episode of #AskTheCEO features a presentation Avrohom Gottheil gave in New Delhi, India for India’s First Annual Deep Tech Summit, titled Deep Tech for All.
[08:05] Paul Colmer, a digital coach and global influencer in Cybersecurity, Cloud, and Digital Disruption, shares his perspective on how everyone’s going to get disrupted, and predicts that this will even affect Governments!
[11:11] We discussed the reason behind the latest trend of speech enabling smart devices. “Time is the new currency, and that is what’s driving the mass adoption of voice-based technology in the marketplace”, said Avrohom
[13:30] J. Dianne Dotson, Science Fiction Writer and Research Scientist, shares how in the future we will be able to leverage AI to search global DNA databases, such as 23 and me, and analyze people’s genomes for disease-causing proteins so that we can disable them and stop diseases from spreading, right from the source.
[15:47] Jola Burnett, VP of GfK Consumer Life in NYC, studies the consumer behavior that drives industry trends. Jola answers the question about whether people will accept companies leveraging AI for their customer interactions. Jola spoke about a scenario where you call into a contact center and ask to speak with a representative but got routed to an AI instead. “Does the customer have an out?”, she asks. It all boils down to the customer experience on whether or not people will accept interactions with AI.
[18:00] Inma Rodriguez, VP of 5G Core, Cloud & OSS, for Ericsson’s Europe and Latin America Market Area, shares her perspective on the considerations business executives need to think about before making an investment in 5G technology
[20:29] Avrohom discusses the Cybersecurity implications of adding massive amounts of IoT devices on our networks. We’re adding 20.4 billion devices by 2020, yet the number of records exposed during data breaches are shooting up exponentially. From January – November 2019 there have already been 4 billion records exposed!
[22:40] To combat the increasing volume of Cybersecurity threats we need to follow the three S’s: Share Information, Secure our networks, and Serve our communities.
[23:40] Kai Hermsen, Global Coordinator for Siemens’ Charter of Trust, introduces this global initiative of 17 companies that are working together to bring trust to a Digital World.
[27:34] Mirko Ross, CEO asvin.io in Stuttgart, Germany shares some of the challenges associated with patching IoT devices.
[28:36] Mirko then goes on further to talk about how we need a secure and automated method of applying patches, as it’s very risky to do this manually. One example he give was with regards to an autonomous vehicle that has an accident. Who is responsible? The owner of the car, the manufacturer, or the software vendor? Which updates were installed at the time of the accident? This issue can become very complex, which is why you need an automated process to streamline the updates.
[32:02] We must serve our community by inspiring and mentoring our children, especially our girls, so that they feel comfortable choosing careers in Cybersecurity.
[37:17] Tyler Cohen Wood is a cyber-authority with 18+ years of highly technical experience. She is working on a very ambitious initiative to inspire girls all around the world to become excited about choosing careers in Cybersecurity. Her project is the all-new Cybergirlpower Conference, which is launching in the summer of 2020. The project’s website is https://cybergirlpower.com/.
Tags: AI, Cybersecurity, IoT
AI & Tech For Good With Adam LG Ring
December 16, 2019
Adam LG Ring is a startup mentor who’s helped many startups & organizations change the world for the better. He has 25 years' digital experience and has helped businesses through the digital transformation process, as well as comply with GDPR data privacy regulations.
[01:06] Entrepreneurship is a really hot topic, nowadays. I believe it’s because of the way the gig economy has completely altered the way people earn a living, that people are turning to entrepreneurship en masse as they believe it to be their only ticket to financial freedom. What are your thoughts on this topic?
[03:45] What is TechForGood?
[05:19] Data Privacy is a human right.
[05:45] Businesses that look after their user’s Data Privacy have a competitive edge in the marketplace.
[11:19] You’ve worked with many GDPR clients, so you know that Data Privacy is a serious thing. With the ubiquity of Artificial Intelligence, what role do you see it having in helping businesses keep their customer’s data safe?
[12:33] AI and Machine Learning have become so commonplace that, unfortunately, people are mistakenly using the terms interchangeably. Can you share with us the proper definitions and applications of those terms?
[15:23] Let’s make sure our young people learning AI can invent things, because in 10-20 years, the Artificial Intelligence that will be, won’t be anything like the AI everyone’s predicting.
[17:00] Why do you need to leverage AI for Data Privacy and Cybersecurity?
[21:54] Just like we’re advancing with AI for good, hackers are developing AI for bad, and without any oversight.
[22:55] Tony Flath: In the future, it’s going to be a war of machines.
[23:39] According to an article published by Forbes in 2015, 9 out of 10 startups fail. This is a really big number and very painful, especially considering the way we started our conversation where startups are a critical component of our economy. Where do Entrepreneurs go wrong?
[28:00] Successful Entrepreneurs are the ones who get a co-founder.
[28:15] You can’t rely on employees to have the same passion as founders do, because they don’t have the same equity in the business.
[28:55] What is the one question that will determine if an entrepreneur will be successful?
[29:53] I understand that you help startups to not repeat the mistakes that others before them have made. Can you share with us a little bit about the work that you do?
[32:27] How do people connect with you?
[36:08] Do you have any parting words of wisdom that you’d like to share with the audience?
Tags: AI, Digital Transformation, Entrepreneurship
Implementing 5G With Inma Rodriguez
December 16, 2019
Inma Rodriguez is the VP of 5G Core, and Cloud Solution and Service Line for Ericsson’s Europe and Latin America Market Area, where she supports Digital Services Operators and their customers with complex Cloud transformation projects, including the introduction to 5G technology.
[00:42] Inma, I’m so excited to be speaking with you today, because 5G is one of the most talked-about technologies in the market, as it is seen as an enabler of things from Smart Cities to Healthcare; and Ericsson is a global leader in 5G as well as a trusted partner in helping businesses prepare for 5G. What are some of the considerations business executives need to think about before making an investment in 5G technology?
[01:40] 5G will be more than just an incremental upgrade from 4G. It will be an enabler to many enterprises for their digitalization process.
[03:10] 5G will enable healthcare providers to remotely deliver emergency medical care during the wait for an ambulance!
[04:50] Many businesses in your market area are still on 3G, and in the bigger cities, some of them might already be on 4G. What are your customers struggling with as they prepare for the jump to 5G, and how is Ericsson supporting them?
[06:55] 5G Technology is more than just the speed. It encompasses the entire infrastructure!
[07:44] What is Network Slicing?
[11:05] 5G is so new that people might be struggling to visualize the migration process, end to end, so it's wonderful that you're actually working with real people who are already implementing this technology! Who's doing it right, and what kind of new market opportunities are some of these service providers experimenting with?
[13:46] Telefonica, Vodafone, Telecom Italia, and Swisscom are paving the way with regards to their implementation of 5G.
[14:30] There’s an event coming up shortly, it’s the SDN NFV World Congress in The Hague, Netherlands. I know you will be speaking there. What will be some of the hot topics at this event?
[16:22] How do people connect with you?
[17:04] Inma, it’s very fortuitous that we’re speaking now because we’re recording this conversation during the month of October, which is Global Diversity Awareness Month. As a Woman in Tech, do you have any words of wisdom that you’d like to share with the audience?
[17:04] We need to ensure that we make a career path in technology attractive to women and teenage girls.
Tags: Digital Transformation, Digital Disruption, IoT, 5G
Secure Computing Endpoints With Rob Kirk
December 16, 2019
Rob Kirk has been with IBM and Lenovo for a combined 32 years of experience in the PC industry.
As currently a member of Lenovo's Technical Client Advisor unit, Rob covers Corporate and Healthcare customers, providing technical expertise regarding Lenovo's end-user services, products, and capabilities. With a strong focus on Lenovo's security products and solutions, Rob has been a part of the team representing Lenovo at conferences like BlackHat and Ignite, among other public events. Lenovo makes some of the best and most secure products in the PC industry, and Rob Kirk is part of the team that presents them to the marketplace and educates customers in their use.
Lenovo site filled with imaging and security information, plus much more! https://pcsupport.lenovo.com/us/en/so...
Read more about Lenovo Thinkshield:
[00:25] Rob, I’m so excited to be speaking with you today, because not a day goes by without us hearing about the dreaded Data Breach. Whether it’s a computer getting hacked, or someone’s laptop getting stolen, it seems like CIOs and CISOs have their work cut out for them. What are some of the considerations CIOs should be having when thinking about selecting their next refresh of computing endpoints without having that additional worry about data breaches?
[00:55] Securing against a data breach starts way before assets even come into the company!
[01:05] Cybersecurity is a holistic process which starts with a vetted secure supply chain.
[02:45] Step 2 of Cybersecurity is ensuring that all software has been updated to the latest release level.
[03:00] How Lenovo helps companies maintain the Cybersecurity status of their assets, even when the customer’s IT department removes the pre-loaded OS.
[04:00] What client security advisory process does Lenovo have in place, in the event they get hacked and breached?
[05:50] A docking station is a Cybersecurity vulnerability!
[08:40] The process of security needs to extend to cover the full life cycle of the product.
[09:28] One of the things that keep me up at night, as a person who is very active in the Cybersecurity industry, is the fact that no matter how secure your technology is today – even if it’s a veritable Fort Knox; impervious to any and all attacks known to man – you and I both know that in 6 months from now, a new vulnerability will either be discovered, or created by new technology that’s unimaginable, even today. I’m certain that CISCOs around the world are concerned about that as well. How can we EVER be secure from threats that don’t even exist yet?!
[11:00] Manufacturers that have few updates on their website should be taken as a warning sign.
[11:20] Manufacturers that have many updates, listed on their websites, means that they’re paying attention.
[12:50] Even if you have a secure device, end-users are a major Cybersecurity vulnerability!
[14:30] Facial recognition and biometrics help with Cybersecurity by preventing people from seeing you type a password.
[15:19] When using a laptop in a public area, facial recognition can trigger your monitor to blur when it detects someone looking over your shoulder.
[16:49] As a global leader in secure computing endpoints, can you share some best practices on how businesses can be Cyber-Safe without slowing people down or sacrificing on productivity?
[19:31] What are some of the considerations business executives need to have when selecting their next computing assets, to cut down on occurrences of end-users disabling security software?
[22:11] How do people connect with you?
[26:18] Do you have any parting words of wisdom that you’d like to share with the audience?
[26:30] “If it ain’t broke, don’t fix it” is the wrong philosophy when it comes to Cybersecurity!
Tags: AI, Cybersecurity, Digital Transformation
FinTech and Digital Transformation With Xavier Gomez
September 12, 2019
Xavier Gomez is founder & COO of INVYO, a SaaS company that uses machine learning and Natural Language Processing (NLP) to help financial institutions see tomorrow’s opportunities in Fintech. He is also Co-Editor-in-Chief at Invyo Insights powered by INVYO, a global provider of Fintech insights and analysis. As a banker, Xavier has been sharing his vision of the sector with industry pioneers over the past 18+ years.
He holds a certification from the Massachusetts Institute of Technology (MIT) specialization Fintech (2016) and is a graduate of HEC Paris in Private Equity (Leadership Executive program in Private Equity in partnership with AFIC – French Association of Investors for Growth) in 2017.
In 2000, he started his career at Credit Suisse (private banking) in Paris as a portfolio management consultant (2000-2004), selling structured products in Zurich, Switzerland (2005-2007), assistant vice president in charge Investment Consulting in Paris (2007 – 2008), Vice President in charge of Investment Consulting (2009 – 2013) in Paris, Director in charge of investment and trading in Paris and Treasurer of Credit Suisse France. From 2016 to 2018, he became Global Senior Portfolio Manager and Asset Allocator at Pictet & Cie.
He is an expert in banking, finance, and economics as well as banking and digital transformation.
He is interested in the digital economy and especially in innovations in the field of finance (Fintech), an area in which he sometimes writes some articles in the specialized media. Moreover, he is a speaker in various global FinTech conferences around the world.
[01:23] From what you’ve seen, what are some of the challenges FinTechs face when doing a Digital Transformation?
[04:40] Cybersecurity and Trust are extremely important factors in FinTech.
[06:30] What are the opportunities for FinTech in Africa?
[07:00] FinTech firms need to have a good Cybersecurity solution.
[07:20] Can you provide some examples of companies that are doing Digital Transformation correctly? Who’s doing it right?
[07:36] What lessons can we learn from FinTech leaders such as JP Morgan, Chase, Citigroup, and Goldman Sachs regarding Digital Transformation?
[11:00] eCommerce providers such as Amazon and Alibaba will disrupt FinTech by commoditizing banking as a service.
[13:00] FinTech incumbents can’t afford to be complacent, as major disruption is taking place by startups.
[15:00] The biggest challenge for FinTech startups is earning Consumer Trust in B2C.
[16:20] I understand that you work with FinTechs. Can you share with us the ways you help them through the Digital Transformation process?
[21:27] How big is the Business Intelligence Market?
[21:27] The Business Intelligence Market will be $340bn by 2023 with an annual growth of 15% beyond that.
[21:57] AI is critical for Business Intelligence because more data isn’t better – you need the RIGHT data!
[23:36] Data is the new oil of the 21st Century, and Analytics is the combustion engine.
[25:00] You don’t need more data. You need the right data!
[25:15] How do people connect with you?
[25:42] Do you have any parting words of wisdom to share with the audience?
Tags: Cybersecurity, Digital Transformation, Fintech
How Science Fiction Influences Technology With J. Dianne Dotson
August 01, 2019
[00:30] Give us a short synopsis of The Questrison Saga.
[07:13] As you know, #AskTheCEO is a technology show, where we talk about technologies, such as IoT, Cybersecurity, AI, and the tie-in to Science Fiction is that science fiction influences technology. As a Sci-Fi writer, and a research scientist, what technology trends are you seeing, that might have been influenced by Science Fiction?
[07:13] Star Trek influenced technology!
[08:07] The movie Gattaca influenced AI in HealthCare, such as
[08:07] What is the future of healthcare?
[10:15] Sci-Fi influences AI to deliver mental health care.
[12:00] The future of AI is Fairness – it will eliminate bias, such as racial, gender, and color.
[13:48] I’m truly amazed by the constant and rapid innovation in technology, such as AI, The Internet of Things, and 5G. Just imagine, within a few short years (if not sooner), there will be billions of these connected devices connecting our cities, homes, and businesses. We’re literally living in science fiction!
[14:28] What will the future be like?
[14:50] We have replicators!
[16:24] Virtual Reality will help deliver better mental health care by connecting people around the world.
[17:24] Question from Tamara McCleary, CEO Thulium: As a novelist and someone who has a visionary mind, what would the Singularity look like?
[19:25] Question from Tamara McCleary, CEO Thulium: They say real life is stranger than fiction. How does real life fuel your science fiction writing?
[22:30] Question from Jola Burnett, VP GfK Consumer Life: What are some of the sources of inspiration for the Sci-Fi world - and the technology/tools that exist in this universe?
[25:00] We live in a time of powerful technology, but it’s our connection to each other that forms our happiness and well being. The technology is just the icing on the cake.
[25:14] I understand that when you’re not writing spellbinding novels, you’re working with clients on projects, such as writing about technology, the environment, and other interesting topics. What kinds of topics do you love to write about, and how do people connect with you to engage you on a project? Connect with Dianne here: https://jdiannedotson.com/
[28:43] Do you have any parting words of wisdom to share with the audience?
Tags: AI, Healthtech, Future of Work
The Charter of Trust With Kai Hermsen
March 21, 2019
Kai Hermsen is the Global Coordinator for the Charter of Trust with Siemens, where together with his team in the Central Technology department, he is driving the Siemens Cybersecurity Strategy, Initiatives, and Innovation.
Tags: Cybersecurity, Digital Transformation, IoT
Hackers and Consumer Trust with Scott Schober
February 21, 2019
Mr. Scott N. Schober is the President and CEO of Berkeley Varitronics Systems (BVS), a 45 year-old New Jersey-based privately held company and leading provider of advanced, world-class wireless test and security solutions.
[00:54] The Japanese cryptocurrency firm Tech Bureau Corp said about $60 million in digital currencies were stolen from its exchange, highlighting the industry’s vulnerability despite recent efforts by authorities to make it more secure. What exactly transpired?
[01:52] Why do Cryptocurrency exchanges keep on getting hacked?
[02:34] How can we, as consumers, protect our cryptocurrency investments?
[05:47] Blocksafe Technologies developed products that can protect your digital wallet.
[08:12] How can the Cryptocurrency industry restore consumer trust?
[11:05] A recent report came out regarding some guy who drove off with a brand new Tesla Model 3, which he stole from Mall of America, by using only his cellphone! I'm not sure which thing to be more concerned about - that he hacked into a car & stole it, or that it was done using a smartphone! What's going on here?
[17:20] We need secure OTA Patching for cars!
Tags: Blockchain, Cryptocurrency, Cybersecurity
Navigating Digital Disruption With Paul Colmer
January 24, 2019
[02:46] There is massive disruption taking place in every industry, thanks to the rapid advancement in technology, such as Artificial Intelligence, IoT, Robotics, and so on. As someone who works in, and mentors people on, the forefront of cutting edge technology, what kinds of trends are you seeing regarding Digital Disruption?
[03:15] How do you define Digital Disruption?
[04:20] How do you define Digital Transformation?
[05:14] Prediction: Every industry will be disrupted, including governments!
[06:50] GDPR in EU is a form of disruption.
[07:44] There are forms of GDPR that have been adopted as law all around the world.
[10:52] A Digital Transformation project is not complete without a robust Cybersecurity strategy. What are you seeing out there, with regards to the ways companies employ Cybersecurity and Data Privacy Protection?
[11:02] What are the top 5 Cloud Security Threats?
[11:02] The #1 Cloud Security Threat is a Data Breach.
[13:20] How to get through a data breach.
[13:20] A data breach is inevitable. The key is how you will react when it happens.
[14:09] Another buzz word that people hear over, and over again, is BigData. What is that?
[14:38] A few thousand records is called “Little Data” (up to 100k rows).
[15:07] BigData is about making good business decisions around very large sets of data.
[16:20] Our personal habits are contributing to the huge volumes of data.
[19:42] What is Machine Learning?
[21:01] The Tesla Driverless Car
[22:33] Blockchain: Beyond the hype
[23:28] McKinsey: It will take many years for Blockchain to go into production. https://www.mckinsey.com/business-functions/digital-mckinsey/our-insights/blockchain-beyond-the-hype-what-is-the-strategic-business-value.
[23:28] The challenge with Blockchain is scalability
[24:05] Will Quantum Computers solve the challenges with Blockchain?
[26:22] Quantum Computers raise Cybersecurity fears
[27:08] Another component to Digital Transformation is migrating to The Cloud. In an article published by ZDNet in November 2018, they wrote about Guinness World Records and stated that Cloud Computing is the key to their digital transformation. What do businesses need to know as they contemplate migrating to The Cloud?
[30:30] Can you tell us about some of the technical courses you teach, and what kinds of businesses would benefit the most from these classes?
Tags: AI, Cryptocurrency, Digital Disruption
The Importance of Digital Ethics With Bill Mew
December 27, 2018
[ 01:48] Can you explain to the lay-person, what is digital ethics all about, and why is it so important?
[01:48] Facebook data breach
[04:04] A decade ago, people expected companies to take action for issues such as, Diversity, Sustainability, and Global Warming. Nowadays, it’s Privacy & Data Security.
[05:20] If there is a perception of a lack of trust, people won’t do business with you.
[07:58] Companies need to have some form of privacy assessment.
[09:03] To protect your brand, companies need to be prepared for a data breach.
[13:00] Companies are potentially liable for the criminal actions of their employees, such as a data breach.
[13:50] Class action lawsuits are starting to emerge in response to companies’ behavior during a data breach.
[14:57] How do you define Digital Ethics?
[15:15] Digital Ethics is defined as having a cultural approach across an organization that is as responsible for data, as anything else of equal value.
[16:40] Will GDPR be coming to the US?
[18:00] Why companies need a Digital Ethics consultant.
[22:20] A small Cloud provider in the UK beat Amazon & Google by differentiating themselves with Data Privacy & Data Sovereignty.
[26:33] France is giving up the Google browser in favor of local Qwant, citing concerns about US Tech domination.
[27:30] Under the Cloud act, any company that operates in the US is subject to seizure by the US Government.
[30:00] Every kind of business, from every industry, is impacted by Digital Ethics.
Tags: Cybersecurity, Digital Disruption, Privacy
Digital Transformation and Cybersecurity with Tony Flath
November 29, 2018
[01:28] There is a term that you hear a lot when speaking about education called STEM. As a supporter of young people, what is STEM and why is it important?
[02:42] One of the challenges we hear about all the time is that there aren't enough qualified candidates for high tech jobs, such as in the field of Cybersecurity. What's your opinion on what should be done to address this challenge?
[05:21] Rob May, Human Firewall - All users need to be trained, as they are all considered perpetrators and vulnerabilities, with regards to Cybersecurity.
[09:00] Hacks and data breaches are happening at an alarming rate. According to Statista, as of mid-2018, there were 668 data breaches, exposing 22.41 million records of data! How can we leverage emerging technologies, such as AI, Machine Learning, and Cloud in order to bolster our data security?
[09:45] Traditional Cybersecurity is about perimeter and endpoint control. We need next-generation tools that have application visibility.
[11:40] SIM - Security Information Module - provides event monitoring.
[20:17] Cybersecurity - it's a war of machines!
[23:00] Blockchain & AI will help us better identify and control threats and security.
[23:29] It seems like everyone is into Digital Transformation these days. What do CIOs need to know in order to implement a successful digital transformation project?
[25:54] Cloud or on Prem?
Tags: AI, Cybersecurity, Digital Transformation
AI and Blockchain for Healthcare Provider Credentialing
October 04, 2018
[01:19] Your company, Professional Credentials Exchange, has come up with an innovative idea on leveraging Blockchain for Healthcare. Can you tell us about it?
[01:19] Healthcare provider credentialing is a 4-6 month process.
[06:10] How will you incentivize practitioners and insurance companies to join the collective on the Blockchain?
[06:37] Every day that a hospital practitioner doesn't bill, the hospital forfeits $7,500. That's $150k / month, and $900k / 6 months!
[09:38] Credentialing is a perpetual process.
[13:33] What are the major components of the exchange infrastructure? Why use Blockchain?
[17:53] According to an article posted by Forbes, we have an epidemic of health data breaches across the country, and 40% of those breaches come from people who already have access to health records in some form or another -- what we call insiders. How do you address the governance of the data inside the Blockchain?
[23:46] How does something like this scale effectively in such a large market?
[26:31] What, in your opinion, are the keys to building a successful application leveraging blockchain technology?
[27:49] Why can't you store large amounts of data on a blockchain?
[27:49] Blockchain is not a database. It's a distributed transactional ledger.
Questions from the Audience:
[29:10] Ken Herron - CMO Intelligent IoT Messaging Company, Unified Inbox, Orlando, FL - Hi Anthony! If you were to ask three smart people what Blockchain is, you'd likely get three (if not more) different answers. As patients are one of healthcare's key stakeholders, how do you suggest Blockchain, how it is being used, and why, be explained (preferably proactively) to patients?
[31:37] Bennet Bayer - Former Global CMO @ Huawei and long-time Microsoft distributor and channel champion, Seattle, WA- How do you separate Blockchain from the cryptocurrency discussion?
Tags: AI, Blockchain, Healthtech
AI and Blockchain in Online Retail and Fashion with Nova Lorraine
September 27, 2018
[01:32] Tell me a little bit about Raine Magazine and the work that you do?
[04:25] What are some of the challenges facing the Fashion Industry, which is being solved by high tech?
[08:23] How can technology assist people with shopping for clothes online?
[08:23] Augmented Reality can help people try on clothes virtually.
[09:14] Digital Mirrors will allow consumers to try on clothing in real time, via the use of Augmented Reality.
[09:14] Digital Mirrors and AR brings the fashion show experience to the online world.
[09:41] AR enables virtual concierge service for online retail.
[10:34] Design your own shoes with augmented reality!
[11:25] A frequent topic on this show, AI is front and center in every single industry. What AI applications are you seeing in Fashion?
[12:08] BigData is processed into small bytes if enriched information, which enables online retailers to create a personalized profile for each individual user.
[13:49] How will AI answer the age-old question, "Does this dress make me look fat?"
[16:24] Why, sometimes, good technology isn't adopted by the masses.
[16:57] What kinds of vulnerabilities are you seeing in Fashion, with regards to Cybersecurity?
[19:06] What kinds of Blockchain applications are you seeing in Fashion?
[21:22] What's next for Fashion?
Tags: AI, Blockchain, Retail
Digital Transformation, AI, and Cybersecurity With Kai Grunwitz
September 24, 2018
[01:30] AI is seen quite often as an important component for a cyber-security strategy. What is your opinion on AI in Cyber?
[03:31] We're finding more and more, nowadays, that there is a battle between good & evil with AI.
[03:30] With AI, it's machines fighting machines!
[06:05] Cybercriminals are not only as sophisticated as we are, they are professionals.
[06:27] Cybercriminals are building new technologies that other cybercriminals can use as well.
[06:27] Cybercriminals are not just attacking your company, they're also selling the technology to other companies! Cybercrime as a service!
[06:48] Whatever technology we have, cybercriminals have as well.
[08:15] I noticed, in my research, that at your company, NTT Security, you're using a framework to secure digital transformation. What kind of framework you are using? Can you tell me about it?
[11:10] You need to protect your data, because hackers are trying to steal your data.
[14:00] Cybersecurity solutions can't be one size fits all.
[15:10] Digital transformation is a hot topic. Why do we still see a lot of transformation projects focusing on functions without involving Cyber Security early on? Is it still the case?
[15:41] Digital transformation is not optional, nowadays. It's a do or die question.
[16:00] According to IMD in Switzerland (https://www.imd.org/), 4 out of 10 companies, currently leading in their sector, will disappear in the next 5 years!
[17:50] Security by design approach - Cybersecurity must be a part of the development of new products, as trust is needed to win buy-in of consumers.
[20:27] Companies are ready to pay ransom, but they're reluctant to increase Security budgets. What is the challenge for digital transformation in this context?
[24:07] In the future, hacks and ransomware will become much more targeted, targeting critical infrastructure, such as airports, power plants, etc.
[25:06] Companies today are not well prepared for data loss.
[26:26] We talk a lot about AI and how it is changing society, business and work. In cyber security AI is one of the hottest topics, while at the same time, we also talk about skill shortages. Do you think in 10 years from now we will have hordes of security experts without jobs? What will be the role of AI in Cybersecurity?
[27:25] AI will not take away jobs. AI will change the types of jobs available.
[29:09] We need our education system to prepare our children for the workplace of the future.
[31:10] With the discussion around smart cities, a lot of IoT, Data, and Energy discussions have started. What do we need to do, to prepare ourselves, to truly leverage the advantages of living in a digital society?
[32:10] The focus of a Smart City should be to improve the lives of its residents.
[34:32] Is a Managed Services Provider a solution for all the CyberSecurity challenges?
[36:55] Johannas Drooghaag - CEO Spearhead Management, Germany: What is your advice and best practice experience to engage employees in proactive cyber resilience?
[38:33] Johannas Drooghaag - CEO Spearhead Management, Germany: Do you believe that a cyber security insurance is important for SME's?
[40:25] Johannas Drooghaag - CEO Spearhead Management, Germany: Appsec or infosec?
Tags: AI, Cybersecurity, Digital Transformation
Cloud Computing and Data Security With Kevin Jackson
September 20, 2018
[01:23] Tell us a little bit about yourself and the work that you do.
[02:04] Cloud Computing enables new business models that attract global revenue streams.
[02:55] Thanks to The Cloud, you no longer need capital to build infrastructure for a business, because businesses are information based.
[03:28] What are some of the challenges businesses face with regards to data security, when migrating to the Cloud?
[03:28] The biggest challenges when migrating to The Cloud is managing the deluge of data.
[03:45] The typical information worker will create 1MB of data/sec.
[04:35] How is the classification of data managed at such a large scale?
[05:03] Nowadays, the creation of data has exploded!
[05:15] Due to the large volume of data, organizations can no longer afford to store all the data they use in everyday business.
[07:30] According to a report published by AT&T, 25% of companies planned to spend their Cybersecurity budgets on Cybersecurity insurance, which means they're "covered" financially in the event of a breach. As a consumer, that does not give me a comfort feeling that my data is protected. What do you think is the solution to this?
[08:00] Financial risk is only one of the issues associated with data breaches. Reputational risk and business ecosystem risk can be much more damaging.
[10:11]We hear about data breaches happening all the time. Once a business moves their data to the Cloud, if a breach occurs, who is responsible? The company, the Cloud vendor, or both? Are there any special considerations for GDPR?
[10:11] Data Protection is always the responsibility of the entity that collects the data (the data controller).
[11:42] Wonder upon wonder! The Russian Federation has a law that all personal data of Russian citizens are to remain within the physical boundaries of Russia.
[12:28] The executive of Putin shut down LinkedIn across all of Russia!
[13:00] There is no national general data protection law in the United States.
[13:30] The difference in data collection between US and EU, is that in the US it's opt in, VS opt out for EU.
[15:29] What's next for data security?
[15:45] In EU, Data Protection is a basic Human Right.
[15:56] in EU you have the right to be forgotten.
[18:25] Change is constant and accelerating.
Tags: Cloud, Cybersecurity, Digital Disruption
AI, Chatbots, and Customer Experience With Ken Herron
September 17, 2018
[01:27] Before we jump into some exciting news about your company's accomplishments with AI, can you just give our audience a quick overview on what Intelligent IoT Messaging is?
[03:40] AI learns over time.
[04:10] What kinds of businesses would be a good fit for Intelligent IoT Messaging?
[05:36] An app is a fixed interface. What you see is what you get.
[05:36] With an app, you have to change consumer behavior when making an update.
[07:47] An app i great for multiple choice questions.
[09:40] Your company, UIB, recently announced a major accomplishment called Ask William. Can you tell me about it?
[10:15] Giving art a voice.
[11:30] Take a photo and get a response.
[12:00] UIB's Ask William is a virtual tour guide.
[13:38] The AI industry is headed towards personalization and personality - the customization of experience.
[15:50] AI makes every business global!
[18:39] How did Ask William get its name?
[20:07] I imagine that Ask William is becoming somewhat of a celebrity in Singapore, sort of like Siri. Are there any "hidden" features like jokes or witty lines that people can trigger?
[22:00] What's next for Ask William?
[23:10] What next for UIB?
Tags: AI, Digital Disruption, IoT
Information Security, AI, and Blockchain With Will LaSalle
September 13, 2018
[01:25] AT&T recently published a Cybersecurity report stating that "The C-suite still has a significant lack of understanding of cybersecurity basics—the hygiene and the threats, the bad actors. And it's after the fact, after they've been breached, that the board actually does something about it—and that's true in even some of the largest companies." Furthermore, they go on to state that 25% of companies plan to spend their cybersecurity budgets on Insurance! Where is this disconnect coming from?
[04:15] Equifax Breach
[07:15] Elon Musk says he's going off of Facebook because we can't trust them.
[14:35] Tell us a little bit about JLS Technology USA & what kinds of solutions do you provide to the marketplace?
[14:35] Digital Transformation, Cybersecurity, Governance, Compliance.
[18:40] Telecos & Contact Centers are extremely vulnerable to cyber attacks, due to the wealth of personal information in their databases. How can they protect themseves from the daily barrage of cyberattacks, such as phishing, ransomware, and other social engineering based attacks?
[22:30] How is Blockchain being leveraged for data security?
[22:30] IAM Platform & Background check verification in Blockchain.
[22:30] Combat Healthcare Fraud by Verifying the person in the Blockchain.
[25:49] What kind of AI tools are being introduced for Cybersecurity?
[25:49] AI is needed because there aren't enough people to fill Cybersecurity jobs!
[31:29] What's going to be the next disruptor in data security?
[32:30] When calling into a contact center, you can't tell anymore if you're speaking to a human or a chatbot!
Tags: AI, Blockchain, Cybersecurity
Cybersecurity, AI, and Industry 4.0 With Johannes Drooghaag
September 03, 2018
[01:23] As an accomplished Cybersecurity industry expert, what keeps you up at night?
[01:23] What keeps Johannes Drooghaag up at night is people using technology (i.e. connected kids' toys) without being aware of the associated risks.
[01:23] Industrial automation was built last century without security considerations.
[05:36] Trump's Soccer ball
[07:22] How will GDPR play a role in how smart device data is collected?
[11:30] Wherever we go we leave electronic fingerprints.
[14:13] What are some practical ways that people can protect themselves from cybercriminals?
[22:59] What types of innovation are you seeing in Industry 40?
[22:59] Industry 40 is about creating flexible industries.
[22:59] How Industry 40 enables efficient manufacturing of cars.
[25:30] What are some of the innovate ways AI is being applied to HealthCare?
[25:30] AI is helping physicians better diagnose and treat patients.
[31:48] What are some practical applications for Blockchain?
[31:48] Blockchain is minimizing waste for automotive recalls by enabling us to select only the vehicles that have the actual defect.
[38:37] Quantum Computers and their impact on Cybersecurity.
[42:50] Siemens Charter of Trust - we're obligated to provide updates and patches during a product's lifetime. This will become the gold standard.
[44:55] We, as consumers, must educate ourselves on our security options.
[45:50] What's next for Industry 4.0? More Transparency. Cleanup of older industries that pollute the environment.
[45:50] Can we retrofit older devices or replace them?
[45:50] AI will be bigger than BigData because it gives us capabilities to make complex decisions in realtime.
[45:50] Blockchain adds a fingerprint of everything we do online.
[47:45] Fight child slavery with Blockchain.
Tags: AI, Cybersecurity, IoT
Digital Health, Health Tech, and AI With Irma Rastegayeva
August 23, 2018
[10:00] 5G Technology enables billions of sensors.
[10:00] IoMT - Internet of Medical Things - Connected Health
[10:00] What are Future Trends in HealthCare?
[14:10] Where is TeleHealth being Adopted?
[16:55] What are the challenges when it comes to Digital Health?
[21:58] Will AI take away jobs in healthcare?
[24:37] What are your thoughts on nanotechnology?
[31:22] What will be the next disruptor in Healthcare?
[33:42] How has technology changed dentistry?
[35:42] Where do Entrepreneurs go wrong?
Tags: AI, Digital Disruption, Healthtech
IoT, Cybersecurity, and Blockchain With Mirko Ross
August 20, 2018
[02:10] I've seen statistics, where researchers estimate that there will be 50 billion connected devices by 2020. We've all heard about recent hacks, such as connected printers mining bitcoins, or gas pumps dispensing unlimited gasoline. As connected devices become more prevalent and numerous in our homes and businesses, how can we ensure that they stay up to date, in terms of security?
[17:52] Blockchain has been touted as the digital Fort Knox, impervious to hacks, and virtually unalterable. But is that really true?
[20:50] Over The Air patching of IoT devices may be an attack in
[23:27] Many companies are just now understanding the impact that “doing IoT” will have on their businesses (it’s called “business transformation” for a reason!). For companies who feel like they’re a "little behind" in getting started, what is your advice to help them to get the most out of their IoT investments?
Tags: Blockchain, Cybersecurity, IoT
Cybersecurity Briefing for Senior Executives With Kayne McGladrey
August 16, 2018
[01:23] What are the most pressing Cyber threats to businesses?
[03:30] Why is diversity, and hiring more women, so important for Cybersecurity?
[07:54] Why do cybercriminals go after our data?
[24:11] With cybercriminals spoofing GPS signals, how concerned should we be about them redirecting self-driving cars?
[25:21] What's next in Cybersecurity and Cybercrime?
[31:40] Where do Entrepreneurs go wrong?
[37:19] Social Media today is essential in business. Is there any danger in being "too social" on social media, and sharing too much private information, that cyber thieves might use against us?
Tags: Business Strategy, Cybersecurity, Digital Transformation
Cybersecurity, Encryption, and Blockchain With Ken Morris
August 13, 2018
[01:32] Given your experience in Cybersecurity, what keeps senior executives up at night?
[02:53] How do you resolve the question of securing medical devices?
[14:05] What role will Blockchain play in Cybersecurity in the coming years?
[16:55] What is the root cause of data breaches in corporations?
[24:17] Where do Entrepreneurs go wrong?
Tags: Blockchain, Cybersecurity, Digital Transformation
Cybersecurity Strategies for Corporations With Arthur Price
August 06, 2018
[3:29] It's troubling that there isn't enough expertise out there right now.
[5:00] Why are there not enough women in cybersecurity, and how to get women and young people into cyber careers?
[7:00] What is the problem with Corporate Strategy for Cybersecurity? We don't look at Cybersecurity from a holistic perspective.
[8:00] Can CISOs sell security to CEOs?
[8:15] What is the root cause of data breaches in corporations?
[8:50] How to fund cybersecurity in corporations?
[11:00] How does a board of directors invest in IT?
[11:30] How do you advise a board of directors on how important Cybersecurity is, and why it is critical to businesses?
[11:30] How do you prepare the board of directors to make business decisions in case of a data breach?
[16:00] Blockchain & IAM will change the way we look at data protection.
[16:50] What keeps Arthur motivated?
[18:53] Where do Entrepreneurs go wrong?
[25:09] What role will Blockchain play in Cyber in the next 5 years?
[29:00] IT & Cyber are business decisions.
Tags: Business Strategy, Cybersecurity, Digital Transformation
Hackers, Botnets, and Cybersecurity with Scott Schober
August 02, 2018
Mr. Scott N. Schober is the President and CEO of Berkeley Varitronics Systems (BVS), a 45 year-old New Jersey-based privately held company and leading provider of advanced, world-class wireless test and security solutions. Since the beginning of Mr. Schober’s BVS tenure in 1989, the company’s product line of wireless test and security instruments has increased to over 100 products with a core focus on Wi-Fi, Cellular, WiMAX, LTE, IoT and advanced radio devices. As an experienced software engineer, Schober has developed cellular test instruments used for measuring, optimizing and plotting signal coverage, primarily for the initial cellular build-out throughout the United States. Scott’s recent focus has been development (patent pending) of BVS’ cell phone detection tools, used to enforce a ‘no cell phone policy’ in various markets including government, corporate, military, educational, correctional and law enforcement. Thousands of these security tools have been deployed throughout every state in the U.S. and around the world.
Tags: Cybersecurity, Digital Transformation, Emerging Technology
Cognitive IoT With Sudha Jamthe
August 01, 2018
[01:25] What is Cognitive IoT? IoT + AI.
[05:22] Cognitive IoT applications in Smart Cities.
[06:00] Facial recognition will become our ID.
[07:22] Medical applications for Cognitive IoT.
[11:03] Cognitive IoT focus is to save lives. Example: Stop treadmill based on multiple data sources which indicate the person is having heart problems.
[16:48] Topics covered in Sudha's course.
[21:38] Intelligent toasters & refrigerators!
[22:38] Pivoting your career to IoT & student success stories.
[29:21] Discussion on some of the guest speakers.
[30:00] Connected doorbells.
[32:20] Blockchain for supply chain - smart refrigerator.
Tags: AI, Digital Disruption, IoT
Data Security with Elizabeth Zalman
September 24, 2017
Elizabeth Zalman is the Co-founder & CEO of strongDM, the definitive data security product. Previously she was Co-Founder and CEO of the cross-device profile company Media Armor. After its acquisition, she served as VP of Analytics at the acquirer, Nomi. Prior to Media Armor, she led the client analytics and media optimization team at Dotomi (now Conversant), generating an annual $500M in incremental revenue for 50 of the IR Top 100. With over 15 years' experience leading data-driven organizations, she is an expert in analytics, data privacy, and security.
Tags: Business Strategy, Cybersecurity, Digital Transformation
Cybersecurity & Hacking with Scott Schober
July 04, 2017
Tags: Business Strategy, Cybersecurity, Digital Transformation
Soft Skills are Key in Cyber and Technology Careers! With Deidre Diamond
June 06, 2017
At only 26 years old Deidre Diamond was the Vice President of Sales for the national technical staffing agency Motion Recruitment, in charge of leading the hiring, training and development of hundreds of technical recruiters from an entry-level college graduate hiring model.
Diamond took this almost 15 years of technical staffing experience to Rapid7 (NYSE:RPD) as their first Vice President of Sales. Diamond’s leadership resulted in Rapid7’s new sales revenue increasing from $800,000 to $20M in under four years—consequently creating $45M in new revenue generation. Diamond then became the CEO of Percussion Software, where she led the new content marketing software releases and learned the operations and execution of digital marketing, content marketing and web development.
Diamond is now the Founder and CEO of national cyber security staffing company CyberSN and the not-for-profit organization #brainbabe (brainbabe.org). Because Diamond herself was hired as an entry-level college graduate and trained to lead technology service and cybersecurity organizations, she believes the tech community needs to expand its awareness of what it means “to be in tech” and “to be in cybersecurity.” In 2016, Deidre joined ICMCP as a Strategic Board member, working to include more diversity hires in the cyber security community.
Tags: Cybersecurity, Future of Work, HR
Intelligent IoT Messaging With Ken Herron
April 28, 2016
Ken is a top influencer on IoT and 4th most followed CMO on Twitter. He is the Chief Marketing Officer for Singapore based intelligent IoT Messaging Company, Unified Inbox. He's also a popular author and frequent speaker on Leveraging technology for marketing.
Tags: AI, Customer Experience, IoT