
Decrypting IT
Welcome to Decrypting IT—your go-to podcast for the latest tech trends and insights! Together, we’ll break down everything from cybersecurity to managed services and cloud solutions. Whether you’re an IT pro or just tech-curious, we’re here to share expert advice, real success stories, and actionable tips from our team, partners, and clients. Let’s simplify technology, spark innovation, and navigate the ever-changing IT world—together!
Episodes
9 episodes
Outpacing Ransomware: Building a Future-Ready BCDR Strategy
In this episode of Decrypting IT, Ashley Wallace sits down with Brian Williams to unpack why Business Continuity and Disaster Recovery (BCDR) is so much more than an IT checkbox. They dig into how ransomware is changing the game, why i...
•
Season 1
•
Episode 9
•
33:24

Inside the SOC: Why Cybersecurity Monitoring Can’t Sleep
In this episode of Decrypting IT, host Ashley Wallace speaks with Alec Fenton, VP of Security Operations at Foresite, about the critical importance of cybersecurity monitoring and the challenges organizations face in maintaining effective secur...
•
Season 1
•
Episode 8
•
20:38

Flat Networks, Big Risks: The Cybersecurity Gap in OT
In this episode of Decrypting IT, Ashley Wallace and Rich Springer discuss the critical importance of network segmentation in operational technology (OT) environments. They explore the differences between IT and OT networks, common misconceptio...
•
Season 1
•
Episode 7
•
25:29

The Critical Role of Cyber Resilience
In this episode, Ashley Wallace and Paul Ihme discuss the critical importance of incident response planning in today's cyber landscape. They explore how organizations can prepare for breaches, the essential components of an incident response pl...
•
Season 1
•
Episode 6
•
28:02

Navigating Breaches: Strategies for Response
In this episode of Decrypting IT, host Ashley Wallace and guest Steven McNutt discuss the critical importance of perimeter security in today’s cybersecurity landscape. They explore the evolution of firewalls, the necessity of multi-factor authe...
•
Season 1
•
Episode 5
•
29:30

The Vision Behind the 2025 Cybersecurity Annual Report
In this kickoff episode, Ashley Wallace sits down with Katalyst CEO Luke Johnson to unpack the vision behind the 2025 Cybersecurity Annual Report. They explore why mid-size organizations are facing growing cybersecurity gaps, highlight some of ...
•
Season 1
•
Episode 4
•
10:34

The Truth About AI (It’s Not Taking Over)
In this episode of Decrypting IT, host Ashley Wallace and guest John Arnott explore AI's evolving role in business and everyday life. They discuss generative AI, common misconceptions, and strategies for effective AI use. The conversation cover...
•
33:31

Are you ready for the next ransomware wave?
In this episode of Decrypting IT, Ashley Wallace and cybersecurity expert Chuck Flynn break down today’s biggest cyber threats—from ransomware-as-a-service to AI-powered attacks. They explore why small and mid-sized businesses are espe...
•
Season 1
•
Episode 2
•
33:43

Unlocking Productivity with Microsoft Copilot
In this episode, Ashley Wallace and Josh Krodel discuss Microsoft Copilot, an AI-powered assistant integrated within Microsoft 365. They explore its functionalities, security considerations, user training, and implementation strategies. The con...
•
Season 1
•
Episode 1
•
35:56
