Conf T with your SE-logo

Conf T with your SE

Technology Podcasts

"Conf T with your SE" is a trailblazing podcast designed specifically for the tech-savvy listener. Launched in 2019, it brings together thought leaders, experts, and enthusiasts in the world of technology to spark insightful discussions, share industry trends, and tackle complex technical concepts in an accessible and engaging way. Hosted by seasoned systems engineer, Bryan Young, the show breaks down the barriers between the intricate world of computer networking and software and the everyday listener. Bryan's knack for simplifying complex concepts, paired with his infectious enthusiasm for the new and disruptive technology makes the podcast a hit among novices and experts alike. The "Conf T with your SE" podcast dives deep into a wide array of topics, from the nitty-gritty of coding and algorithm design to the larger implications of technology on society. It also covers career guidance, industry trends, the latest research, and interviews with leading figures from tech giants to startup pioneers. Listeners of "Conf T with your SE" not only gain a deeper understanding of the world of Information Technology but also get a chance to be part of a growing community that's passionate about learning, innovating, and pushing the boundaries of what's possible in tech. Yet the dialogue doesn't end with the podcast! We invite listeners to join our growing Discord community at https://discord.gg/shgnswpKzw. Here, you can extend the discussions, engage directly with Bryan and other listeners, and even suggest topics for forthcoming episodes. It's a place for learning, debating, networking, and experiencing the thrill of the ever-evolving tech industry. Whether you're an experienced professional hunting for fresh insights, a student aspiring to carve out a career in the industry, or a tech enthusiast keen to grasp the world of systems engineering, "Conf T with your SE" caters to all. Tune in, participate in the Discord discourse, and be part of this enlightening voyage through the technological landscape!

Location:

United States

Description:

"Conf T with your SE" is a trailblazing podcast designed specifically for the tech-savvy listener. Launched in 2019, it brings together thought leaders, experts, and enthusiasts in the world of technology to spark insightful discussions, share industry trends, and tackle complex technical concepts in an accessible and engaging way. Hosted by seasoned systems engineer, Bryan Young, the show breaks down the barriers between the intricate world of computer networking and software and the everyday listener. Bryan's knack for simplifying complex concepts, paired with his infectious enthusiasm for the new and disruptive technology makes the podcast a hit among novices and experts alike. The "Conf T with your SE" podcast dives deep into a wide array of topics, from the nitty-gritty of coding and algorithm design to the larger implications of technology on society. It also covers career guidance, industry trends, the latest research, and interviews with leading figures from tech giants to startup pioneers. Listeners of "Conf T with your SE" not only gain a deeper understanding of the world of Information Technology but also get a chance to be part of a growing community that's passionate about learning, innovating, and pushing the boundaries of what's possible in tech. Yet the dialogue doesn't end with the podcast! We invite listeners to join our growing Discord community at https://discord.gg/shgnswpKzw. Here, you can extend the discussions, engage directly with Bryan and other listeners, and even suggest topics for forthcoming episodes. It's a place for learning, debating, networking, and experiencing the thrill of the ever-evolving tech industry. Whether you're an experienced professional hunting for fresh insights, a student aspiring to carve out a career in the industry, or a tech enthusiast keen to grasp the world of systems engineering, "Conf T with your SE" caters to all. Tune in, participate in the Discord discourse, and be part of this enlightening voyage through the technological landscape!

Language:

English


Episodes

Ep 65 - Day in the Life of a SOC Analyst

3/4/2024
Summary This conversation explores the role of a SOC analyst and the challenges they face in the cybersecurity field. It covers the structure and responsibilities of a SOC team, the impact of remote work on communication and collaboration, and the skills required to be a successful SOC analyst. The conversation also delves into the tools and technologies used in a SOC, the career path of a SOC analyst, and the importance of passion and continuous learning in the IT industry. In this conversation, Bryan and Jordan discuss the qualities of a SOC analyst, the challenges and rewards of the job, significant threats and their mitigation, collaboration with other teams, the role of AI in the SOC, future threats such as quantum computing, and advice for aspiring SOC analysts. They also share funny incidents that have occurred in the SOC. Overall, the conversation highlights the importance of continuous learning, effective communication, and a passion for cybersecurity in the SOC role. Takeaways A SOC (Security Operations Center) is responsible for mitigating threats and analyzing network data to identify potential security breaches. Communication and collaboration are crucial skills for SOC analysts, especially in a remote work environment. SOC analysts need to prioritize and manage alerts effectively to differentiate between actual threats and false positives. Key skills for SOC analysts include analytical thinking, programming knowledge, and incident handling. Becoming a SOC analyst typically involves obtaining a degree in cybersecurity and gaining experience through tiered roles within a SOC team. SOC analysts should have a passion for cybersecurity and be coachable and willing to learn. Challenges in the SOC can be mentally taxing, but the job is rewarding when able to identify and mitigate threats. Collaboration with other teams, such as security engineers, is crucial for a cohesive and effective defense. AI can play a role in automating certain aspects of the SOC, such as alerting and response. Future threats, including quantum computing, should be considered and prepared for in the SOC. Aspiring SOC analysts should be open to learning, ask questions, and embrace the challenges of the job.

Duration:01:23:07

Ep 64 - Pen Testing and Remediation

12/6/2023
Show Notes for Episode 64: Penetration Testing and Remediation in Cybersecurity Welcome to Episode 64 of our cybersecurity-focused podcast! In this installment, our host Bryan Young is joined by two experts in the field of cyber defense, Megan Scherer and Ryan Wager from Secure Network Technologies. Dive deep with us as we explore the critical roles that penetration testing and remediation play in safeguarding organizations against digital threats. Main Themes: The Importance of Penetration Testing: Our guests discuss how penetration tests are crucial for identifying weaknesses in a variety of infrastructural setups, from small businesses to large enterprises. Cybersecurity Remediation: Learn about the steps that need to be taken once vulnerabilities are found, and the importance of timely and effective action to protect an organization’s data integrity. Awareness of Cyber Risks: Megan and Ryan stress the need for organizations to be fully aware of the potential risks to their clients, suppliers, and internal operations. They also address the unique challenges faced by organizations without specialized IT teams or a Chief Information Security Officer (CISO). Internal Collaboration: Drawing parallels with the development issues of the Ford Pinto, the discussion turns to the importance of internal collaboration within organizations to prevent and mitigate security risks. Keeping Up with Evolving Threats: The ever-changing landscape of cybersecurity means constant vigilance and updates to security measures are necessary. The episode touches on the possibility of using automation to stay ahead of the game, especially with the emergence of state-sponsored cyber threats. Partnership with Driven: Hear about Secure Network Technologies’ partnership with Driven and how it has helped in pinpointing security vulnerabilities. Call to Action: Listeners are encouraged to visit the podcast’s website for more information and resources, and to share the episode with others who are interested in cybersecurity. Don’t miss this in-depth conversation that could help you better understand and improve your organization’s cyber defenses. Stay safe and stay informed! Remember to subscribe and share Episode 64 with your network. Until next time, keep your data secure and your systems checked! For additional resources and episode transcripts, please visit our website. If you have questions or topics you’d like us to cover in future episodes, reach out to us through our contact page.

Duration:00:53:35

Ep 63 - Quantum Computing

11/22/2023
Episode Summary: In this episode, Bryan Young invites Igor Barshteyn to demystify quantum computing and its implications for cybersecurity. They dive into the intricacies of how quantum computing challenges current encryption methods, specifically public key cryptography, and what that means for data security. The discussion pivots around the looming necessity for transition to post-quantum cryptography and the roles that various entities like NIST, NSA, and leading tech companies are playing in this arena. Key Points Discussed: Notable Quotes: Resources Mentioned: SolarWinds lawsuit articleNIST's post-quantum cryptography projectOpen Quantum Safe project Call to Action: hello@conft.showhttps://discord.conft.showConf T Merch Closing Thoughts: Bryan and Igor emphasize the importance of staying informed and proactive in the face of quantum computing's challenges to cybersecurity. They encourage listeners to audit their encryption protocols and prepare for the inevitable transition to quantum-resistant cryptography.

Duration:01:03:34

Ep 62 - Empowering our Veterans in the Digital Age

11/8/2023
Show Notes: Episode 62 - Empowering Veterans in the Digital Age - Guest Introduction: - Guests from Tech4Troops, an organization providing free computers and education programs to veterans. - Guests share their military backgrounds, highlighting their experiences and challenges. - Importance of Supporting Veterans: - Conversation emphasizes the significance of supporting veterans and addressing their unique needs. - Tech4Troops' mission to bridge the digital divide for veterans is highlighted. - Role of Video Games: - Guests discuss the positive impact of video games on their lives, aiding in relaxation and camaraderie. - Highlight the therapeutic benefits of gaming for veterans. - Commitment to Sustainability: - Tech4Troops' commitment to sustainability, data destruction, and recycling efforts are discussed. - The environmental benefits of e-waste recycling are highlighted. - Educating Veterans: - Tech4Troops' in-person programs across the US to educate veterans in computer usage are emphasized. - The importance of providing education and skills to veterans for their successful transition is discussed. - Call to Action: - Encourage listeners to donate their electronics to support Tech4Troops' initiatives. - Highlight the significance of recycling e-waste for a sustainable future. - Express desire for expansion, collaboration with an educational institution, and increased support for veterans nationwide. Links Tech for Troops - https://techfortroops.org/ Donate to T4T - https://techfortroops.org/support/donate/ T4T Discord - https://discord.gg/jkqNAg9bT9 T4T Twitch - http://twitch.tv/tech4troops

Duration:00:55:27

Ep 61 - Tales from the De-Crypt

10/31/2023
In this Halloween-themed episode, the hosts share several spooky and comical IT horror stories submitted by listeners. One mishap involved a prank wav file being mistakenly played on thousands of households. Another incident recounted a technician's struggle to fix power outages amid a tropical storm. Mistakes like wrong hard drive shipments and accidental data erasure are also shared. The speaker highlights the impact of network configuration errors and the importance of thorough double-checking. Lessons from various IT professionals are shared, including stories about wrong interface deletions, eerie experiences like a basement full of satanic symbols, close calls, and being trapped in an elevator. Other tales involve humorous incidents, near-death experiences, a hacking incident, and dealing with flash floods. Data centers with outdated equipment and piles of wires, comical encounters like spilling beer on the boss, and intricate phone system repairs turned lawsuits are discussed. Finally, an intricate cable management disaster resulting in a severe power outage affecting thousands of people is shared. The speaker expresses gratitude, encourages listeners to connect on social media, and emphasizes the need to back up configurations. **Links:** - Follow Alexis - https://linktr.ee/digital.byte - Join the Discord - https://discord.conft.show - Driven - https://www.driven.tech Thanks for tuning in to Conf T with your SE! If you found this episode informative and entertaining, please consider rating and reviewing our show on your favorite podcast platforms. Your support helps spread the word!

Duration:00:54:57

Ep 60 - Safeguarding Bytes with Fortinet

10/11/2023
In this episode of Conf T with your SE, host Bryan Young welcomes special guest Steve Staurovsky from Fortinet. They start by discussing their previous meeting at the CT NUG event and the wide range of products in Fortinet's portfolio. The importance of interoperability and collaboration with other vendors in the industry is highlighted. Steve emphasizes the need for securing operational technology (OT) environments, especially in industrial and healthcare settings, where secure access and data transmission are crucial. The conversation then shifts to the challenges of securing and updating machines in the manufacturing industry that are connected to the network but cannot be easily updated due to their age. The speakers stress the importance of keeping these assets online and the difficulties in finding replacements or compatible hardware. They also discuss the lack of interaction between IT and OT, the vulnerabilities created by preventative maintenance schedules and legacy applications, and the increasing sophistication of ransomware attacks. Fortinet's EDR product is mentioned as a solution for securing legacy devices such as old versions of Windows. The need for legacy asset support is further emphasized through a story about a critical asset running on an outdated system. Fortinet's ability to run on unsupported assets and provide peace of mind is highlighted. The conversation then moves on to Fortinet's FortiLink feature, which enables traffic routing through the firewall, offering advantages in terms of defense in depth strategy and flexibility. The evolution of FortiGate firewall from separate boxes for different functions to a single integrated solution is discussed, along with the variety of hardware sizes, feature sets, and licensing options available. The speakers then delve into the cycle of expansion and contraction in IT, from mainframes and terminals to the current cloud services and multiple clouds. They touch on the increasing need for processing power and how the cloud addresses this demand. The conversation takes a nostalgic turn as they reminisce about gaming, specifically playing Unreal Tournament and attending a LAN party at the Rochester Institute of Technology. Fortinet's free training and certification program, offered during the pandemic, is mentioned, with praise for its high quality and polished production. The importance of using correct terminology in the IT industry is emphasized, along with a personal anecdote about using the correct terms with a doctor. The discussion briefly touches on Chromebooks and the speaker's experience with an original CR-48 Chromebook from Google. The speakers stress the significance of understanding and using the correct terminology in IT and networking, highlighting its impact on communication and professionalism. They also mention the benefits of having knowledge in electrical systems within the IT industry. The conversation veers towards programming and its integration into networking, mentioning the use of Postman and sharing their experiences with programming tasks. They conclude by briefly mentioning upcoming merchandise related to their podcast and recommending checking out Fortinet's training and certification at training.fortinet.com. The features of FortiGates, including the use of custom ASICs for better performance and lower power requirements, are discussed. The issues with the supply chain and its impact on product availability are touched upon, with an overall optimistic outlook for improvement. The cloud management capabilities of Fortinet's products are then explored, with a focus on FortiManager. The speaker explains how FortiManager allows centralized management and logging of devices, making changes and ensuring synchronization across multiple devices easier. The ability to templatize network configurations for scalability and automation is mentioned, along with the advantages of using FortiManager compared to manual device configuration....

Duration:01:13:18

Ep 59 - Redefining Storage with Pure Storage

9/27/2023
Show Notes: Episode 59 - Redefining Storage with Pure Storage | Conf T with your SE Overview In this episode of Conf T with your SE, Bryan Young welcomes Chandler Bassett from Pure Storage. Together, they explore the groundbreaking world of affordable SSD storage and discuss the history and evolution of Pure Storage. Tune in to learn about the company's innovative solutions to Flash reliability concerns, its execution pipeline, and its advanced technology for enhancing storage performance and efficiency. Topics Covered In-Depth Conversations Pure Storage Products Concluding Thoughts Connect with Us Discord Don't miss out on this in-depth exploration of Pure Storage and the redefinition of storage solutions in the modern age. Tune in now!

Duration:01:10:11

Ep 58 - Demystifying NaaS with Nile Secure

9/13/2023
**Show Notes:** In this episode, Bryan sits down with experts Austin Hawthorne and Michael Kowal from Nile to unpack the intriguing topic of networking as a service. Dive into the discussions that span from defining the technology to its market implications and challenges. **Topics Covered:** - Introduction to Networking as a Service: - Defined as tech always ready for business needs without complexities and costs. - Other definitions including broadband, outsourcing IT, and managed services. - Market Expectations: - Influence of cloud adoption disrupting the market. - Need for alignment of spend based on business performance. - Challenges: - For incumbent vendors to adjust due to tech debt, customer, and market demands. - Complexity of delivering network as-a-service compared to other as-a-service offerings. - Speed Benefits: - Frequent software upgrades, faster fixes, and reduced failure radius. - Network Deployment: - Standardizing approaches for predictive outcomes. - Secure networking involving zero trust and RADIUS. - Automation & Configuration: - Addressing underlying complexities before introducing automation. - Reducing bugs through streamlined testing and the concept of a digital twin. - Vendor Challenges: - Existing codebase sizes, feature support, and delay in fixes and new features. - Documenting profiles for new QS features and identifying bug dependencies. - Security Aspects: - Approaches to network edge security. - Challenges between security and network teams. - The trade-off between risk, complexity, and cybersecurity insurance. - Zero-Trust Principles: - Challenges with implementing dynamic ACLs, roles, and more. - Importance of encryption, authorization, and enforcement. - Limitations of traditional networking setups using VLANs. - Firewalls: - Machine-to-machine traffic and security benefits. - Local switching and RADIUS and DHCP server roles. - Network Access Control (NAC): - Definition and implementations. - SSO as a form of NAC and Zero Trust constructs for the network layer. - Nile Network: - Payment models and Proof of Value (POV) offerings. - Network Implementation & Automation: - Benefits of automation over manual approaches. - Introduction of soft bots and Nile service block. - Closing Notes: - Visit the show's website, rate, and review the episodes, and reach out with questions, comments, or suggestions. --- **Links:** - Nile Secure - www.nilesecure.com - Join the Discord - discord.conft.show - Driven - www.driven.tech Thanks for tuning in to Conf T with your SE! If you found this episode informative and entertaining, please consider rating and reviewing our show on your favorite podcast platforms. Your support helps spread the word!

Duration:01:36:27

Ep 57 - The Next Chapter

7/28/2023
Bryan and Tom share some big announcements around the future of the podcast. Connect With Bryan: https://www.linkedin.com/in/bryyoung/ Connect With Tom: https://www.linkedin.com/in/thomas-porto-6a97b05a/

Duration:00:19:37

Ep 56 - Cisco Live '23 Recap

7/12/2023
Welcome to Episode 56 of Conf T with your SE, where we do a complete recap of Cisco Live '23. Bryan Young and Tom Porto are joined by Sal Limura and Alexis Bertholf for a full discussion. In this episode, we dive into all the latest announcements from Cisco Live '23, including: And much more! Links: http://cs.co/6040OHJdQhttp://cs.co/6041OHJdvhttp://cs.co/6042OKNpahttps://linktr.ee/digital.bytehttps://www.youtube.com/channel/UC2KVKOuK4Hwa3NJRA3FHefg

Duration:01:09:16

Ep 55 - E-mail Threat Defense

6/28/2023
Welcome to the latest episode of Conf T with your SE, hosted by Bryan Young and Tom Porto. In this insightful episode, we welcomed the delightfully eloquent British guest, Paul Jones, to discuss an ever-pervading issue in today's tech landscape - email security. To kick off the discussion, we dove into why email security remains a significant concern today, despite advancements in tech. It turns out, email is still the number one attack vector. We explored the evolution of email security, shifting from gateway devices to our cutting-edge cloud-based API-driven email security solution. This transformation begs the question - is the era of the email gateway over? We learned about ETD (Email Threat Detection) - a powerful email security tool fortified by AI. What's the secret sauce behind its efficacy? Paul shared some fascinating insights into the history of ETD, tracing its roots and growth. The conversation navigated towards Microsoft's email security. Is it sufficient, or should users look elsewhere? We learned about heuristic engines and their role in email security. These engines analyze message content, the number of recipients, and included links to identify malicious messages. The use of search capabilities to locate and take action on messages within your environment was another enlightening segment. Aside from tech, we got a sneak peek into Paul's passion - woodworking. Check out his exquisite craftsmanship at BeesBoardsMA.com. This episode was a deep dive into the nuances of email security, its importance, and the future of email protection tools. Tune in and get to know more about the world of cybersecurity.

Duration:01:03:19

Ep 54 - XDR Deep Dive

6/14/2023
Title: Episode 54 - XDR Deep Dive with Matt Robertson and Aaron Woland Hosts Bryan and Tom return with a fascinating exploration of Extended Detection and Response (XDR) in this latest episode of Conf T with your SE. We kick things off with a fundamental question - What is XDR? Our guests, security experts Matt Robertson and Aaron Woland, provide an insightful overview and outline the pressing need for XDR in today's security landscape. The discussion then veers towards understanding the key differences between XDR and SecureX, another well-known security platform. Our hosts dig into the integration of tools like Cisco Threat Response and Orchestration built into SecureX, illuminating how XDR ups the ante by bringing detection into the tool, instead of merely relying on individual security products. Robertson and Woland emphasize the importance of an open XDR platform - one that seamlessly integrates with other vendors outside of Cisco. They detail the significant role of built-in analytics in bolstering security efficacy. Addressing the limitations of Endpoint Detection and Response (EDR), the experts cite the fact that EDR can only reach about 30% of a company's assets and explain why XDR's broader scope is critical in the current context. We then delve into comparisons with Security Information and Event Management (SIEM) systems. Are they the same as XDR? Or, perhaps more pertinently, is a SIEM system enough? Lastly, the conversation steers towards the operational aspects of XDR, specifically how it can confirm, prioritize, and walk through an incident - an essential aspect of any robust cybersecurity framework. Tune in to this gripping episode to deepen your understanding of XDR and why it's vital in today's digital landscape.

Duration:01:17:01

Ep 53 - DDoS Deep Dive

5/31/2023
Welcome to another episode of Conf T with your SE! We're excited to bring you a deep dive into Distributed Denial of Service (DDoS) attacks with our hosts Bryan and Tom, and special guests Mike Geller and Bryan Green. In this episode, we cover: Current and Recent DDoS Attacks and Hacktivism: We kick things off with an overview of recent events in the world of DDoS attacks, shining a light on the alarming rise of hacktivism. Reasons for DDoS Campaigns: Understand the motivations behind these malicious actions, from political motivations to cybercrime. Impacts to Businesses and Organizations: We delve into the repercussions of service unavailability, including the need to go out of band – the desperate behaviors that result from DDoS attacks. Pre-Attack Planning: Our guests highlight the importance of having an action plan before the crisis hits. Types of DDoS Attacks: From volumetric attacks to application layer attacks, we break down the different DDoS strategies cybercriminals use. DDoS as a Distraction: We discuss how DDoS attacks can be a smokescreen for a much larger, more devastating attack, and how this can go unnoticed due to resource saturation. The Importance of Defense in Depth: Discover the necessity of a multi-layered security approach to combat DDoS attacks effectively. The Democratization of DDoS Attacks: As barriers to entry lower, sophisticated DDoS attacks are becoming a commodity. We explore this dangerous trend and its implications. Don't miss this insightful discussion, packed with essential advice for fortifying your defenses against the ever-present threat of DDoS attacks! Connect with the Show Like us on Facebook: https://www.facebook.com/conft.show Follow us on Twitter: https://twitter.com/ConftShow

Duration:01:01:10

Ep 52 - AI, Ethics and Cybersecurity

5/17/2023
In this thought-provoking episode of Conf T, hosts Bryan Young and Tom Porto sit down with Joe Marshall, also known as Rooster Cogburn. Joe, a Senior Security Strategist with Talos, brings his expertise in artificial intelligence and machine learning to the table. AI vs ML: We kick off the episode by addressing a common confusion - what is the difference between Artificial Intelligence (AI) and Machine Learning (ML)? Thanks to an enlightening explanation from ChatGPT, we now know that AI is the broader concept of machines being able to carry out tasks in a way we would consider 'smart', while ML is a specific subset of AI that involves the idea of training machines on data to learn and make decisions. AI Confidence and Source Citation: A deep dive into the issues surrounding AI's confidence and its lack of source citation. We discuss why it's so important for AI to cite its sources and how it can be improved. Ethical Guardrails in AI: Joe gives an insightful perspective on the ethical guardrails in place for AI and how they can potentially be circumvented, sparking a thoughtful debate on the ethical use of this technology. AI Sentience: Is AI sentient? This question sparks a fascinating discussion about the nature of sentience and how it applies, or doesn't apply, to AI. AI and the Dark Web: We explore the sinister side of AI with a look at its use on the Dark Web. How is AI being leveraged by those operating outside the law, and what can be done about it? AI for Phishing and Other Nefarious Tasks: We delve into the concerning issue of AI being used for phishing and other malicious activities. What are the implications, and how can we defend against it? AI Pranks: On a lighter note, we discuss some of the more amusing uses of AI, sharing anecdotes about pranks and other humorous applications and even pulling one live on the show on Mr. Porto. Combating AI-Driven Cybersecurity Threats: Joe gives his expert advice on how to go on the offensive against AI-driven cybersecurity threats. Using Failure to Determine Personhood: An intriguing concept is presented - using failure as a way to determine whether an entity is a real person or AI. Future of AI: Finally, we contemplate the future of AI, now that the barrier to entry has been drastically lowered. What's next on the horizon for this rapidly evolving technology? Tune in to gain some valuable insights into these topics and much more. Whether you're a tech enthusiast or a professional in the field, this is an episode you won't want to miss.

Duration:01:06:21

Ep 51 - Industry 5.0

5/3/2023
Hosts: Bryan and Tom Guest: David Gutshall, Head of Industrial IoT Manufacturing Sales at Cisco Topics covered: Follow David! LinkedIn: https://www.linkedin.com/in/david-gutshall/ Connect with the Show Like us on Facebook: https://www.facebook.com/conft.show Follow us on Twitter: https://twitter.com/ConftShow

Duration:01:15:19

Ep 50 - Meraki FTW

4/19/2023
Welcome to the 50th episode of Conf T with your SE, where we deep-dive into the fascinating world of networking technologies and solutions! In this milestone episode, we're thrilled to have Ryan Harami, Meraki expert and three-time guest on the show, join our hosts Bryan Young and Tom Porto for a riveting discussion about the latest innovations in the Meraki ecosystem. Together, they will explore Meraki Vision, a way to utilize AI and Machine Learning to gain additional insights as to what is being seen by Meraki cameras. Get insights into the Meraki Button, a customizable IoT device designed to streamline user experiences and enhance efficiency across various industries. Stay tuned as Ryan also shares his expertise on the cutting-edge BLE e-ink displays, a versatile and energy-efficient solution that offers a myriad of applications in smart buildings, retail, and more. Finally, don't miss the segment on Catalyst Monitoring within the Meraki Dashboard, an essential tool for IT administrators looking to optimize network performance and troubleshoot issues effectively. Join us for this special episode as we celebrate 50 episodes of Conf T with your SE, and get inspired by the powerful and innovative solutions that Meraki has to offer! Follow Ryan! LinkedIn: https://www.linkedin.com/in/ryanharami/ Links Meraki Apps Marketplace: https://apps.meraki.io/ Connect with the Show Like us on Facebook: https://www.facebook.com/conft.show Follow us on Twitter: https://twitter.com/ConftShow Watch us on YouTube: https://www.youtube.com/channel/UCLpvS4z8zbGvKiWbroTvHeA Check out our website: https://www.conft.show Contact us: hello@conft.show Join the Discord Study Group - It's all About the Journey: https://discord.gg/hqZ7XEG

Duration:01:01:26

Ep 49 - Secure Workload

4/5/2023
In episode 49 of Conf T with your SE, Bryan and Tom are joined by special guest Mario Ruiz to explore the topic of secure workload. With the rise of cloud computing and distributed systems, ensuring the security of workloads has become more important than ever before. Mario brings a wealth of expertise in this area, having worked with major cloud providers and helped organizations across various industries secure their workloads. Throughout the episode, the trio discusses different approaches to securing workloads, including containerization, encryption, and monitoring. They also delve into the challenges and trade-offs involved in securing workloads in complex distributed systems. Whether you're a developer, a security professional, or simply interested in learning more about secure workload, this episode has something for you. So sit back, relax, and join Bryan, Tom, and Mario for an insightful and informative conversation on secure workload. Don't forget to subscribe and leave us a review! Our Guest Mario Ruiz Connect with the Show Like us on Facebook: https://www.facebook.com/conft.show Follow us on Twitter: https://twitter.com/ConftShow Watch us on YouTube: https://www.youtube.com/channel/UCLpvS4z8zbGvKiWbroTvHeA Check out our website: https://www.conft.show Contact us: hello@conft.show Join the Discord Study Group - It's all About the Journey: https://discord.gg/hqZ7XEG

Duration:01:11:55

Ep 48 - Thousand Eyes and Catalyst

6/16/2021
Special guest Simon Donahue joins us to talk about Thousand Eyes and our recent integration with Catalyst Switches. Follow Simon! LinkedIn: https://www.linkedin.com/in/simondonahue/ Links What is digital experience monitoring: https://www.thousandeyes.com/product/digital-experience-monitoring Embedded Agent Info: https://www.thousandeyes.com/blog/thousandeyes-cisco-sdwan-optimized-digital-experience Free Trial: https://www.thousandeyes.com/signup/ Free t-shirt: https://www.thousandeyes.com/tshirt/ Connect with the Show Like us on Facebook: https://www.facebook.com/conft.show Follow us on Twitter: https://twitter.com/ConftShow Watch us on YouTube: https://www.youtube.com/channel/UCLpvS4z8zbGvKiWbroTvHeA Check out our website: https://www.conft.show Contact us: hello@conft.show Join the Discord Study Group - It's all About the Journey: https://discord.gg/hqZ7XEG

Duration:00:57:43

Ep 47 - DNA Spaces

6/2/2021
Special guests Jake and Sean discuss DNA Spaces, Cisco's people and asset tracking solution. Our Guests Jake Lovisolo LinkedIn - https://www.linkedin.com/in/jakelovisolo/ Sean Park LinkedIn - https://www.linkedin.com/in/seanpark2020/ Mojo's Instgram - hairlessnhappy Links DNA Spaces - https://dnaspaces.cisco.com/ DNA Spaces Demo - https://dnaspaces.cisco.com/demo/ Connect with the Show Like us on Facebook: https://www.facebook.com/conft.show Follow us on Twitter: https://twitter.com/ConftShow Watch us on YouTube: https://www.youtube.com/channel/UCLpvS4z8zbGvKiWbroTvHeA Check out our website: https://www.conft.show Contact us: hello@conft.show Join the Discord Study Group - It's all About the Journey: https://discord.gg/hqZ7XEG

Duration:00:49:13

Ep 46 - Mitre Att&ck Framework

5/21/2021
Bryan and Tom invite special guests Keith Manville and Mike McPhee to go over what the Mitre Attack Framework is and how it can be used to help security teams. Our Guests Follow Keith - https://www.linkedin.com/in/keithmanville/ Follow Mike - https://www.linkedin.com/in/mike-mcphee/ Links Mitre Framework Homepage - https://attack.mitre.org/ Mitre Engenuity - https://mitre-engenuity.org/ Connect with the Show Like us on Facebook: https://www.facebook.com/conft.show Follow us on Twitter: https://twitter.com/ConftShow Watch us on YouTube: https://www.youtube.com/channel/UCLpvS4z8zbGvKiWbroTvHeA Check out our website: https://www.conft.show Contact us: hello@conft.show Join the Discord Study Group - It's all About the Journey: https://discord.gg/hqZ7XEG

Duration:00:45:32