And There You Have IT!-logo

And There You Have IT!

Technology Podcasts >

Is your organization agile and secure enough to survive? Join Cherie Dost, former Chicago Public Radio host, as she chats with industry leaders about information technology trends and their impact on people, business, and our world. From IT security to cloud technology, learn how your business can not only survive, but thrive.

Is your organization agile and secure enough to survive? Join Cherie Dost, former Chicago Public Radio host, as she chats with industry leaders about information technology trends and their impact on people, business, and our world. From IT security to cloud technology, learn how your business can not only survive, but thrive.
More Information


United States


Is your organization agile and secure enough to survive? Join Cherie Dost, former Chicago Public Radio host, as she chats with industry leaders about information technology trends and their impact on people, business, and our world. From IT security to cloud technology, learn how your business can not only survive, but thrive.




A Crash Course in Securing Your Data

The key to defining data protection for your business is understanding the type of data you collect and knowing how you store and manage it. By classifying your data, you can gain a thorough understanding of your business needs and data protection goals, which will make it easier for you to build a data protection strategy that’s up to the task. In this episode of And There You Have IT!, industry experts from Sirius and Dell EMC give us a crash course on data protection and where to start...


A Guide to the Multi-Cloud Data Management Challenge

In this episode of And There You Have IT, industry experts discuss what to consider when developing a multi-cloud data management strategy. They’ll cover all the reasons why it’s a good idea to have a strategy in place, the most common challenges businesses face when developing one and the best things to keep in mind. Listen to this episode learn:


Taking SIEM to the Next Level

Organizations are suffering from cyber fatigue with too many alerts, too many technologies, and not enough people. This makes it difficult to streamline operations, and decrease the time it takes to detect and remediate security incidents. Companies that rely heavily on security information and event management (SIEM) to support threat detection efforts are increasingly complementing deployments with solutions that advance their analytics capabilities, effectively taking SIEM to the next...


Down with Dark Data: Your Strategy for Intelligent Data Management

Sponsored by Veritas In the drive to transform and modernize IT, backup remains critical. But IT modernization demands a new way of thinking about data, and that means a new way of thinking about backup. In the past, all data was backed up equally. Today, the path to modernization requires going beyond backup to intelligent data management that enables innovation while driving efficiencies. We’re speaking with industry expert Adam Shomaker to learn how organizations can gain a new...


Zero Trust Architecture: Debunking Myths

Sponsor: Palo Alto Traditional data security strategies tend to operate under a “trust but verify” approach — trusting internal users with unrestricted network access and considering the external network as the only network in need of security controls. Rooted in the principle of “never trust, always verify,” Zero Trust architecture is an alternative and individualized approach to network security that uses an organization’s functionality and business objectives to determine exactly what...


Flex Your IT Super Powers with Virtualization

Businesses depend heavily on a solid application infrastructure. Increasingly, IT is the foundation for the business and in charge of enabling organizations to innovate. Speed, agility, impenetrable security, and availability of applications are essential, but also tricky to deliver flawlessly. We spoke with industry expert, Andrew Young, about how a virtualized approach can enable IT to move as fast as the business demands without compromising the security or availability of critical...


Roadmap to Digital Transformation by 2020

Sponsored by Dell EMC Times are changing when it comes to the never-ending storage refresh cycle. By moving to a flexible consumption-based storage model, you can avoid spending too many resources on the yearly refresh, lower expenses and gain efficiencies. So, how can companies get moving on a hyperconverged storage model? We spoke with industry-expert Patrick Conway to learn how to build a roadmap to digital transformation by 2020. Listen to this episode to learn: [Webinar] Top...


Convergence versus Hyperconvergence: Which Horse Should You Back in the Race to Storage Modernization

Storage is undergoing a fundamental transformation as workloads and applications demand higher performance, scalability, and resiliency. Deploying the right converged infrastructure solution can help solve these business challenges, but not all convergence is the same. So, how do you know which solution is right for your business? Today, we’re talking with industry expert Matt Coffey to learn about how to find the right solution and partner for your needs. Listen to this episode to learn...


How IT Simplification can Strengthen and Secure Your Healthcare Brand

Healthcare is constantly changing, and so must its IT. With massive consolidations and mergers driving many healthcare providers, IT organizations are tasked with supporting business-critical projects, securing data, transforming IT, and managing small capex budgets. On top of all this, IT organizations play a critical role in optimizing patient care and outcomes. We spoke with Kevin Gee, a master consultant at Forsythe, to find out how simplifying your IT can revolutionize and enhance...


The Future of IoT Relies in Cybersecurity

Think about all of the information – personal and professional – that you’ve entrusted to the Internet of Things (IoT). Have IoT devices earned this trust we invest in them? Our interactions with IoT are so often focused on automated technology that — by choice or by habit — we often assume we can trust IoT simply because it’s not human. But, in reality, the human elements of IoT devices are critical to their success and to their failure. Just as a device can be programmed to solve...


UNIX Isn’t Dead: Debunking the Myth and Discovering the Value of UNIX

Today, we’re debunking the myth that UNIX is dead. From powering large workloads on complex systems, to lowering total cost of ownership, to merging legacy systems, we’re here to find out how Unix is not only helping businesses survive, it’s helping them thrive in disruptive markets. We spoke with industry expert Kevin Gee to find out how the myth got started and how it’s bringing still value to diverse organizations. Listen to this episode to learn: How to Build a Modern, Secure,...


Machine Learning: How to Reap the Benefits and Avoid the Risks

Sponsored by: McAfee We’ve all heard the buzz about machine learning and artificial intelligence. The terms cover all kinds of exciting and cutting edge tools, but the technology is also evolving all the time. So, how should companies assess machine learning models to see if they’re right for their business? And, how can they integrate the right model, reap the benefits, and keep their risk-management in check? To learn more, we spoke with Celeste Fralick, chief data scientist and senior...


How to Make Hyperconvergence a Smooth Operation

Sponsored by: Dell EMC Hyperconvergence offers a number of benefits, but many enterprises are cautious of adopting the technology. To demystify hyperconverged infrastructure (HCI) solutions, we sat down with convergence solutions specialist Bob Perkins to talk about the deployment process. We find out how to make any HCI installation a smooth operation, from configuration all the way to implementation. Listen to this episode to learn: Hyperconvergence: More than Just Software-defined...


Hyperconvergence in Real Time

Episode Sponsor: HPE From the small and ubiquitous iPhone to the large and complex Tesla, hyperconverged platforms are enabling companies to innovate and disrupt. Is your company ready to do the same? Hyperconverged infrastructure (HCI) solutions have many use cases, but to truly realize the benefits, you have to find the right fit for your enterprise. We spoke with Bob Perkins, a convergence solutions specialist, to find out what you should know before getting started with HCI. Listen...


The Internet of Human Things: Making Meaningful Connections with IoT

From delivering pizzas faster, to saving money on energy bills, to improving healthcare systems, the Internet of Things (IoT) affects not only the convenience and quality of our daily lives. As IoT technology continues to rapidly evolve, the true innovators are the ones incorporating a human touch. We spoke with E.G. Nadhan, chief technology strategist for Red Hat, about companies that are using IoT to drive business value and solve real world problems by focusing on the human connections...


The Secret Life of Cloud Costs

Moving to the cloud can bring you a number of business benefits, but it may cost more than you had planned. According to the RightScale 2017 State of the Cloud, users report an average of 30 percent wasted cloud spend, while RightScale measures actual waste between 30 and 45 percent. The culprit behind these wasted resources: poor planning. To avoid unexpected cloud spend, you need a defined cloud strategy before you migrate. In this episode, host Cherie Caswell Dost speaks with...


Weaponized Smart Devices & the Internet of Things

Gartner predicts that through 2018, over 50 percent of Internet of Things (IoT) device manufacturers will not be able to address threats due to weak authentication practices. Millions of IoT devices — including everyday objects like routers, security cameras, DVRs, medical devices, cars and more — have already been infected with malware and repurposed as zombie armies by cyber attackers. As a result of IoT growth, the bandwidth of distributed denial of service (DDoS) attacks reached...


Episode 009 - The General Data Protection Regulation is Changing IT Security: Are You Ready?

The passing of a new European Union (EU) data protection framework — the General Data Protection Regulation (GDPR) — is having a tremendous impact on enterprises that collect data on Europeans. The May 25, 2018 compliance deadline, which from an IT planning and management perspective is right around the corner, has U.S. organizations scrambling. According to PwC, 77 percent of U.S. multinational companies are planning to spend $1 million or more on GDPR readiness this year, and 68 percent...


Episode 008 – WannaCry and the Evolution of Ransomware

The FBI estimates that $209M was paid to ransomware criminals in the first quarter of 2016 alone. In 2017, ransomware is only growing in sophistication. Consider the WannaCry outbreak, a large-scale ransomware attack that is reported to have hit at least 150 countries, and infected 230,000 machines to date. This worldwide security incident is unprecedented in its disruption of large institutions such as Spain's Telefónica and the United Kingdom's National Health Service (NHS). It is also...


Episode 007 - Pillar Six - Identity and Access Management [Six Pillars of Security]

In this episode about identity and access management (IAM), Cherie and Matt discuss: With a comprehensive security strategy, IAM technology can generate the intelligence you need to increase your understanding of broader security events and advance your overall security posture. Join Forsythe’s host Cherie Caswell Dost, formerly of Chicago Public Radio, and industry expert Matt Sickles, director of consulting services, Forsythe Security Solutions, for a multi-episode series of our...