30 Minutes with a Hacker Podcast

Join us for an engaging monthly podcast series – “30 Minutes with a Hacker.” Hosted by Jade Witte, Solutions Practice Consultant, Tech Data Security, this series delivers insightful and thought-provoking discussions with some of our nation’s best and brightest ethical hackers.

It’s not every day you get to listen in on talks with individuals who are frequently called on by the US government and military to help in/on operations to protect our country. This elite group of men and women are in the trenches daily, participating in the prevention of real-world cyber threats. Tapping into their mindshare on how hackers think to learn how we can guard ourselves against these kinds of attacks is both timely and relevant.

To tie in with our ethical hackers, we’ve recently begun featuring some of our key Tech Data security partners as guests to share their insights on cybersecurity as well. You don’t want to miss this must-hear series.

Latest Episode:


30 Minutes with a Hacker Mitigating Against the Risk of a Breach
Episode: Mitigating Against the Risk of a Breach

As the threat landscape keeps evolving, learning what steps organizations can take to mitigate against a breach is a continually moving target. However, some mistakes seem to consistently reoccur, and often become low hanging fruit for hackers. Follow these steps to give yourself a fighting chance against nefarious hackers.



Guest Appearance: Cory Ainscough, Brad Mathis with Keller Schroeder
🔈 Click here to listen.



Previous Episodes:


30 Minutes with a Hacker How Do You Return to Work Safely?
Episode: How Do You Return to Work Safely?

We have all been forced to work remotely for months now and many companies are beginning the process to migrate back into the office. What are the security risks we’ll see in doing so and what steps can be taken to protect ourselves from an IT perspective.



Guest Appearance: Allen Jenkins and Rick Lull with SyCom Technologies
🔈 Click here to listen.



30 Minutes with a Hacker How to Secure the C-Suite at Home
Episode: How to Secure the C-Suite at Home

In this episode, we dive into the need for having a solid security practice in place to protect your remote workforce from the ground floor to the C-suite. Specifically, we are looking at how the hacking community is targeting company executives working from home. Keno Kozie, one of Tech Data’s security partners, shares what they are seeing in the market with their customer base and how they are securing them.


Guest Appearance: Stan Rabin and Declan Fay, Keno Kozie
🔈 Click here to listen.



Remote Access for Employees Needing to Work from Home
Episode: Remote Access for Employees Needing to Work from Home

As more and more employees scramble to set up to work remotely, this opens up opportunities for hackers to potentially try and exploit home/private networks this scenario for their own gain increases. Join us as we bring in our Tech Data team of white hat hackers for a discussion with two key individuals from CMA Technology Solutions.


Guest Appearance: Adam Arceneaux and Ken Stringer, CMA Technology Solutions
🔈 Click here to listen.


30 Minutes with a Hacker Getting Back to the Fundamentals of Security
Episode: Getting Back to the Fundamentals of Security

There are a lot of great tools and technologies out there that can aid us in securing our organizations. However, it’s important to make sure we are handling the fundamentals first, otherwise, all the cool technology is probably a waste of money. Join us as we bring in our Tech Data team of white hat hackers for a discussion with two key individuals from SHI International Corp., one of the larger IT companies in the market and leaders in the cybersecurity space.

Guest Appearance: Phil Armbrust & Denny Trujillo, SHI International Corp.
🔈 Click here to listen.


30 Minutes with a Hacker Operational Management
Episode: Operational Management Around Security

How is the solution being managed? Do you have a dedicated admin assigned or is it best effort support in your team? Are you keeping track of patches and critical vendor notices? Even though a solution can be properly deployed and tested, missing a critical patch or vendor notice could nullify significant parts of the solution. The vast amount of online search tools has made it very easy to find a number of systems that match a specific version or configuration. Failure to update the solution configuration may leave out critical systems, leave unmaintained systems in place that become vulnerable over time or create inconsistencies in the configuration where the solution reacts outside of our expectations.

Guest Appearance: Darren Bakula & Ryan LaGanke, Monreal Consulting
🔈 Click here to listen.


30 Minutes with a Hacker Episode 11 How do you consult with your customers to get them to make the right decisions to secure their company
Episode: Helping Customers Make the Right Security Decisions

A discussion on how to consult with your customers to help make the most intelligent decision to secure their company’s network infrastructure.

Guest Appearance: Gary Bren, Managing Partner with Turner Technology based in Omaha, NE
🔈 Click here to listen.



30 Minutes with a Hacker Is This Thing On? Verifying Defensive Tools Are Working
Episode: Is This Thing On? Verifying Defensive Tools Are Working

You’ve just deployed the new state of the art security tool. It appears to be working, but are you confident that it is performing as advertised? Newly deployed tools may slow hackers down, but they know the odds are in their favor that you missed something. They also know that they have a better chance at long-term success if they can beat your defensive tools. In this episode, our speakers address why it’s important to validate your security tools and how to do it.


Guest Appearance: Lewis Needham, ATEC Group
🔈 Click here to listen.


The Business of Malware
Episode: The Business of Malware

The rise of Malware-as-a-Service (MaaS) continues. The special knowledge of how to hack and breach is something that only a small select group of people know. You may not have the ability or knowledge to hack or cause any damage with cyber attacks. But as a result of the growth of MaaS, skilled hackers have created marketplaces where they happily sell their malware services to you to help customers attack their desired targets. Tune in for a discussion on the business of malware, its staggering growth and how we must evolve our cyber skills to stay ahead of these nefarious cybercriminals.

🔈 Click here to listen.


View our episode archive to catch up on all of our previous podcast sessions.