
Decrypting IT
Welcome to Decrypting IT—your go-to podcast for the latest tech trends and insights! Together, we’ll break down everything from cybersecurity to managed services and cloud solutions. Whether you’re an IT pro or just tech-curious, we’re here to share expert advice, real success stories, and actionable tips from our team, partners, and clients. Let’s simplify technology, spark innovation, and navigate the ever-changing IT world—together!
Podcasting since 2025 • 9 episodes
Decrypting IT
Latest Episodes
Outpacing Ransomware: Building a Future-Ready BCDR Strategy
In this episode of Decrypting IT, Ashley Wallace sits down with Brian Williams to unpack why Business Continuity and Disaster Recovery (BCDR) is so much more than an IT checkbox. They dig into how ransomware is changing the game, why i...
•
Season 1
•
Episode 9
•
33:24

Inside the SOC: Why Cybersecurity Monitoring Can’t Sleep
In this episode of Decrypting IT, host Ashley Wallace speaks with Alec Fenton, VP of Security Operations at Foresite, about the critical importance of cybersecurity monitoring and the challenges organizations face in maintaining effective secur...
•
Season 1
•
Episode 8
•
20:38

Flat Networks, Big Risks: The Cybersecurity Gap in OT
In this episode of Decrypting IT, Ashley Wallace and Rich Springer discuss the critical importance of network segmentation in operational technology (OT) environments. They explore the differences between IT and OT networks, common misconceptio...
•
Season 1
•
Episode 7
•
25:29

The Critical Role of Cyber Resilience
In this episode, Ashley Wallace and Paul Ihme discuss the critical importance of incident response planning in today's cyber landscape. They explore how organizations can prepare for breaches, the essential components of an incident response pl...
•
Season 1
•
Episode 6
•
28:02

Navigating Breaches: Strategies for Response
In this episode of Decrypting IT, host Ashley Wallace and guest Steven McNutt discuss the critical importance of perimeter security in today’s cybersecurity landscape. They explore the evolution of firewalls, the necessity of multi-factor authe...
•
Season 1
•
Episode 5
•
29:30
