Heavy Strategy

Packet Pushers
undefined
Dec 2, 2025 • 24min

HS119: Securing 2026: How AI, Quantum, and the AI-Powered Browser are Driving Enterprise Defense (Sponsored)

Anand Oswal, Executive Vice President at Palo Alto Networks, joins Johna Johnson and John Burke for a wide-ranging exploration of two emerging focal points of enterprise risk: cryptographically relevant quantum computing, and browser-mediated agentic AI. The looming arrival of quantum computers that can break legacy encryption has already created the threat of “harvest now, decrypt... Read more »
undefined
Nov 25, 2025 • 35min

HS118: Bricking the Company – Discussing Existential Threats with Leadership

The discussion dives into existential threats that could potentially cripple organizations. Concepts like 'bricking the company' and real-world examples, including Travelex and Codespaces, highlight the stakes involved. Insights on how to assess vulnerabilities and the implications of supply-chain risks provide crucial knowledge. The hosts emphasize the importance of framing these risks effectively for senior leadership, recommending concise communication and practical exercises to enhance awareness. The role of AI in amplifying threats is also thoughtfully examined.
undefined
Nov 18, 2025 • 34min

HS117: Environmental, Social and Governance Initiatives: What That Means for Your Organization (Sponsored)

Environmental, Social, Governance (ESG) initiatives aren’t just “the right thing to do”, they can also save companies real dollars, particularly if they’re investing in data centers and other infrastructure. Join Jonathan Ciccio, Continuous Improvement Manager for The Siemon Company, as we discuss The Siemon Company’s ESG initiatives. The Siemon Company has been in business for... Read more »
undefined
Nov 11, 2025 • 33min

HS116: Nth-Party Risk May Put You on the (Block) Chain Gang

Dive into the complex world of nth-party risks and how they ripple through modern supply chains. Discover the implications of recent Salesforce breaches and the rise of agentic AI in managing these hidden dangers. The conversation reveals the need for blockchain as a solution for tracking software changes and ensuring accountability. Explore the challenges of standards and the role of government procurement in driving adoption. The hosts debate the balance between speed and responsible risk management in the face of evolving technology.
undefined
Oct 28, 2025 • 36min

HS115: Cyber-Risk Assessment and Cybersecurity Budgeting: You’re (Probably) Doing It Wrong

In this engaging discussion, hosts explore the pitfalls of linking cybersecurity budgets to IT spending, revealing why this approach is flawed. They highlight human complacency and the need for a fresh perspective on security in a world without clear network perimeters. By recommending a spend-per-employee model, they emphasize the importance of identifying what truly matters to an organization. The conversation also delves into the complexities of AI and third-party risks, urging listeners to modernize their risk assessment strategies.
undefined
Oct 14, 2025 • 40min

HS114: In or Out? Deciding Which IT Functions to Bring In or Push Out

Exploring when to insource or outsource IT functions, the hosts stress the need for organizations to reassess sourcing strategies during shifts in the economy or technology. They discuss the sacrifices made when outsourcing, including loss of control. Key drivers like demographics and cloud economics are analyzed. There's a spotlight on the importance of aligning IT with HR and determining the true purpose behind moving workloads. The discussion also touches on the risks of inaction and the delicate balance between swift transitions and comprehensive planning.
undefined
5 snips
Sep 30, 2025 • 41min

HS113: Bad Tech Romance: Five Signs You’re In an Abusive IT Relationship

Sandy Miller, a pseudonymous CIO, shares her insights on identifying toxic IT work environments. She highlights five signs of an abusive IT relationship, including the dreaded 'Sunday scaries' and stalled promotions. Sandy shares personal experiences of fear and distrust stemming from manipulation of information and siloed cultures. The discussion dives into recognizing hostile workplaces, the impact of bad leadership versus toxic company intentions, and the importance of aligning personal values with corporate missions. A candid exploration of workplace dynamics!
undefined
Sep 16, 2025 • 38min

HS112: Standardizing NaaS Service Definitions

Network-as-a-Service (NaaS) promises enterprises the ability to set up and configure connectivity and network security with a couple of clicks. But for NaaS to truly transform enterprise networking, one thing has been missing: standards. Enter Mplify (formerly the Metro Ethernet Forum), a non-profit focused on standardizing NaaS service definitions. Mplify’s CTO, Pascal Menezes, joins Johna... Read more »
undefined
10 snips
Sep 2, 2025 • 38min

HS111: When Someone Makes Your Cloud Service Go Poof!

The discussion highlights the risks of losing cloud services amidst geopolitical tensions, illustrated by a case of an Indian energy company cut off from Microsoft. It’s crucial for organizations to rethink their risk management strategies and incorporate contingency plans. The impacts of legal changes on corporate structures are explored, emphasizing communication between departments. The hosts advocate for diversifying service providers and preparing for unexpected disruptions, likening it to buying insurance against unpredictability in an unstable global landscape.
undefined
12 snips
Aug 19, 2025 • 23min

HS110: Cryptocalypse Soon! The CRQCs Are Due Sooner Than We Thought

Experts discuss the rapidly approaching threat of quantum computing capable of breaking traditional encryption. Recent estimates show this technology could arrive years sooner than expected. Organizations must act fast, particularly in finance, to adopt quantum-resistant cryptography. The conversation dives into evaluating vendor strategies for data protection and the importance of proactive cybersecurity measures. With cryptographic vulnerabilities on the rise, there's an urgent need for reassessing security practices to safeguard communications in our tech-driven world.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app