Episode 136: Future-Proofing IT Operations with AIOps and Automation
AIOps is revolutionizing IT operations, enabling businesses to manage infrastructure more efficiently than ever. In this episode, we explore how automation, AI, and machine learning are reshaping IT management—driving self-healing systems, autonomous operations, and proactive performance optimization.
As organizations scale, ensuring resilience, minimizing downtime, and controlling costs are more critical than ever. Join us for a forward-looking discussion on the key trends fueling AIOps adoption and the strategies IT leaders can use to future-proof their operations. Expect actionable insights on leveraging AI-driven automation for smarter, more scalable, and cost-effective IT management.
Speakers: Taruna Gandhi, Head of Product Marketing for OpsRamp, Hewlett Packard
Cameron Bulanda, VP of Technical Sales and Centers of Excellence, Connection
Show Notes:
00:00 Introduction to AI in Operations
03:11 The Importance of Observability
05:54 Breaking Down Silos with AIOps
09:10 Real-Life Examples of Self-Healing Systems
12:02 Proactive Management with AI Insights
14:51 Leveraging Anonymized Data for Better Insights
18:05 Future of AI in Operations Management
20:49 Driving Sustainability with AI
23:59 Choosing the Right Partner for AI Solutions
--------
27:44
Episode 135: Unveiling the Hidden Threats in Hyperconnected Healthcare (A Cyber-Thriller's Take on IoMT Security)
In a world where hospitals rely on interconnected medical devices to save lives, there are continuous hidden vulnerabilities lurking beneath the surface. This podcast dives into the realities of IoMT security with John Chirillo, Principal Security Architect and author of the newly released novella Silent 1ntrusions, alongside cybersecurity expert Rob Di Girolamo, to break down the threats, the lessons, and what we can do to defend against them.
We’ll delve into topics Silent 1ntrusions’ main character, Dr. Kristi Chiro experiences as she battles a relentless hacker. A pacemaker’s glitch, insulin pumps go haywire, and an entire hospital teeters on the edge of collapse. In an era of hyperconnected healthcare, how safe are we really?
Speakers: John Chirillo, Principal Security Architect, Connection
Rob Di Girolamo, Senior Security Architect, Connection
Kimberlee Coombes, Security Solution Architect, Connection
Show Notes:
00:00 Introduction to IOMT Security and Silent Intrusions
02:46 Real-World Inspirations Behind Silent Intrusions
06:10 Exploring IOMT Vulnerabilities in Healthcare
08:49 Challenges in Securing IOMT Devices
11:46 Attack Scenarios and Realistic Threats
14:50 Key Takeaways for Healthcare Professionals
18:08 Future Threats in Healthcare Security
--------
19:31
Episode 134: AIOps – The Future of Threat Detection and Response
Artificial intelligence for IT security operations (AISecOps) is revolutionizing cybersecurity. In this episode, we discuss how AI and machine learning are used to analyze IT data, allowing organizations to:
Proactively identify and respond to threats: Detect anomalies, predict outages, and automate incident response.
Improve efficiency: Streamline security operations and optimize resource allocation.
Enhance threat detection: Uncover complex attack patterns and stay ahead of emerging threats.
We'll cover real-world applications of AISecOps, the challenges in implementing this technology, and future trends in AI-driven security. Finally, we'll provide actionable insights for organizations looking to strengthen their security posture with AISecOps.
Speakers: John Chirillo, Principal Security Architect, Connection
Rob Di Girolamo, Senior Security Architect, Connection
Kimberlee Coombes, Security Solution Architect, Connection
Show Notes:
00:00 Introduction to AIOps and Cybersecurity
03:07 The Role of AIOps in Threat Detection
06:01 Adapting to Evolving Cyber Threats
08:58 AI in Proactive Threat Hunting
11:55 Challenges in AIOps: False Positives and Data Quality
14:51 The Future of AIOps and Self-Healing Systems
17:45 AI and Zero Trust Strategies
21:07 AIOps for Small and Medium Businesses
23:52 Final Thoughts and Recommendations
--------
27:34
Episode 133: From Chaos to Clarity – AI Security Tools at Work
In this episode, our Security Center of Excellence team delves into a real-world cybersecurity mystery and its unexpected solution. This incident is a perfect storm, highlighting the complexities of modern IT environments and how seemingly unrelated actions can cascade into significant business disruptions and major security incidents. But here's where it gets fascinating: what appeared to be a sophisticated cyber-attack turned out to be something far more mundane, yet equally dangerous.
The hero of this story is an AI-powered assistant, still in its proof-of-concept phase, that cracked the case. Join us as we unravel the mystery of the Phantom Brute Force attack and the AI detective that solved it. This isn’t just a mere cautionary tale about the complexities of modern IT environments; it serves as a stark reminder of how easily security can be compromised in unexpected ways.
Speakers: John Chirillo, Principal Security Architect, Connection
Rob Di Girolamo, Senior Security Architect, Connection
Kimberlee Coombes, Senior Security Architect, Connection
Show Notes:
00:00 Introduction to Cybersecurity Challenges
01:02 The Incident Unfolds: A Case Study
03:51 Utilizing AI Tools for Incident Resolution
10:29 The Role of AI in Cybersecurity
15:35 Bridging Theory and Practice in Cybersecurity
18:00 Best Practices: Hard-Coded Passwords and Change Management
23:43 Empowering Users with AI Tools
--------
26:26
Episode 132: Frontline Cybersecurity: Trends, Impacts, and Zero Trust Insights
In the ever-evolving world of cybersecurity, staying ahead isn't just an option—it's a necessity. In this episode, we peel back the layers of the latest attack vector trends and take you into the heart of a recent cyber incident that challenged conventional defenses. This isn’t just about technology; it’s about the human element—everyday people navigating an invisible battlefield.
We’ll break down the anatomy of a sophisticated malware attack that slipped past traditional security measures with ghost-like precision. Discover the tools, strategies, and decisions that led to its eventual detection, containment, and remediation.
Beyond the technical deep dive, we’ll explore the critical role of Zero-Trust principles in building resilient defenses and highlight how fostering a culture of awareness and vigilance can be the ultimate game-changer. Whether you’re an industry veteran or just starting your cybersecurity journey, this episode is packed with insights and actionable takeaways to fortify your defenses and stay ahead of emerging threats.
Speakers: John Chirillo, Principal Security Architect, Connection
Rob Di Girolamo, Senior Security Architect, Connection
Pam Kennedy, Senior Cybersecurity Engineer, Connection
Kevin Knapp, Senior Cybersecurity Engineer, Connection
Show Notes:
00:00 Introduction to Cybersecurity Trends
02:50 Ransomware Evolution and Tactics
06:07 AI's Role in Cyber Threats
09:01 Critical Infrastructure Vulnerabilities
11:52 Supply Chain and Vendor Attacks
15:11 Identity-Based Attacks and Authentication Challenges
18:05 Key Takeaways for Organizations
20:57 Case Study: The Wave Browser Incident
27:12 Post-Incident Analysis and Lessons Learned
The world of technology is complex. Each episode of TechSperience will uncover helpful technology, cybersecurity, cloud, and workplace transformation tips to help the everyday IT professional. Tune in for advice from leading IT experts covering retail, manufacturing, healthcare, K-12, higher education, and more.