30 Minutes with a Hacker Podcast

Join us for an engaging monthly podcast series – “30 Minutes with a Hacker.” Hosted by Jade Witte, Solutions Practice Consultant, Tech Data Security, this series delivers insightful and thought-provoking discussions with some of our nation’s best and brightest ethical hackers.

It’s not every day you get to listen in on talks with individuals who are frequently called on by the US government and military to help in/on operations to protect our country. This elite group of men and women are in the trenches daily, participating in the prevention of real-world cyber threats. Tapping into their mindshare on how hackers think to learn how we can guard ourselves against these kinds of attacks is both timely and relevant.

To tie in with our ethical hackers, we’ve recently begun featuring some of our key Tech Data security partners as guests to share their insights on cybersecurity as well. You don’t want to miss this must-hear series.

Latest Episode:


30 Minutes with a Hacker Securing Data in the Cloud
Episode: Securing Data in the Cloud

How secure is you data in the Cloud? AWS, Azure and Google Cloud Platform work with some of the brightest security minds in the industry and have a reinforced infrastructure, but that doesn’t necessarily mean your information is secure. Learn how to protect your sensitive data and avoid some common mistakes that make businesses vulnerable to hackers.


Guest Appearance: Thomas Whang, Donald Zelenak with Impelix
🔈 Click here to listen.



Previous Episodes:


30 Minutes with a Hacker What happens when there has been a breach
Episode: What happens when there has been a breach

There are a growing number of companies that are prepared for when a breach happens. However, not surprisingly, most are not prepared. The financial impact is exponential in these cases. Join us as we discuss with Kudelski Security what happens when there has been a breach and the impact that proper preparation has on an organization.


Guest Appearance: Darrell Switzer, Joshua Davis with Kudelski Security
🔈 Click here to listen.



30 Minutes with a Hacker Mitigating Against the Risk of a Breach
Episode: Mitigating Against the Risk of a Breach

As the threat landscape keeps evolving, learning what steps organizations can take to mitigate against a breach is a continually moving target. However, some mistakes seem to consistently reoccur, and often become low hanging fruit for hackers. Follow these steps to give yourself a fighting chance against nefarious hackers.



Guest Appearance: Cory Ainscough, Brad Mathis with Keller Schroeder
🔈 Click here to listen.



30 Minutes with a Hacker How Do You Return to Work Safely?
Episode: How Do You Return to Work Safely?

We have all been forced to work remotely for months now and many companies are beginning the process to migrate back into the office. What are the security risks we’ll see in doing so and what steps can be taken to protect ourselves from an IT perspective.



Guest Appearance: Allen Jenkins and Rick Lull with SyCom Technologies
🔈 Click here to listen.



30 Minutes with a Hacker How to Secure the C-Suite at Home
Episode: How to Secure the C-Suite at Home

In this episode, we dive into the need for having a solid security practice in place to protect your remote workforce from the ground floor to the C-suite. Specifically, we are looking at how the hacking community is targeting company executives working from home. Keno Kozie, one of Tech Data’s security partners, shares what they are seeing in the market with their customer base and how they are securing them.


Guest Appearance: Stan Rabin and Declan Fay, Keno Kozie
🔈 Click here to listen.



Remote Access for Employees Needing to Work from Home
Episode: Remote Access for Employees Needing to Work from Home

As more and more employees scramble to set up to work remotely, this opens up opportunities for hackers to potentially try and exploit home/private networks this scenario for their own gain increases. Join us as we bring in our Tech Data team of white hat hackers for a discussion with two key individuals from CMA Technology Solutions.


Guest Appearance: Adam Arceneaux and Ken Stringer, CMA Technology Solutions
🔈 Click here to listen.


30 Minutes with a Hacker Getting Back to the Fundamentals of Security
Episode: Getting Back to the Fundamentals of Security

There are a lot of great tools and technologies out there that can aid us in securing our organizations. However, it’s important to make sure we are handling the fundamentals first, otherwise, all the cool technology is probably a waste of money. Join us as we bring in our Tech Data team of white hat hackers for a discussion with two key individuals from SHI International Corp., one of the larger IT companies in the market and leaders in the cybersecurity space.

Guest Appearance: Phil Armbrust & Denny Trujillo, SHI International Corp.
🔈 Click here to listen.


30 Minutes with a Hacker Operational Management
Episode: Operational Management Around Security

How is the solution being managed? Do you have a dedicated admin assigned or is it best effort support in your team? Are you keeping track of patches and critical vendor notices? Even though a solution can be properly deployed and tested, missing a critical patch or vendor notice could nullify significant parts of the solution. The vast amount of online search tools has made it very easy to find a number of systems that match a specific version or configuration. Failure to update the solution configuration may leave out critical systems, leave unmaintained systems in place that become vulnerable over time or create inconsistencies in the configuration where the solution reacts outside of our expectations.

Guest Appearance: Darren Bakula & Ryan LaGanke, Monreal Consulting
🔈 Click here to listen.


30 Minutes with a Hacker Episode 11 How do you consult with your customers to get them to make the right decisions to secure their company
Episode: Helping Customers Make the Right Security Decisions

A discussion on how to consult with your customers to help make the most intelligent decision to secure their company’s network infrastructure.

Guest Appearance: Gary Bren, Managing Partner with Turner Technology based in Omaha, NE
🔈 Click here to listen.


View our episode archive to catch up on all of our previous podcast sessions.