A gumbo of insights and information about Cybersecurity and Data Protection
…
continue reading
The “ITOps, DevOps, AIOps - All Things Ops” podcast is dedicated to operating and managing modern large-scale IT infrastructures. If you want to learn best practices from other Leaders in IT operations, this show is for you. Each episode features an interview with a senior IT executive or Thought Leader, discussing topics like: 1. How to manage the increasing complexity of hybrid IT infrastructures 2. How to effectively leverage automation to “do more with less” 3. Getting the most out of mo ...
…
continue reading
ePlus helps our clients imagine, implement, and achieve more from technology. Our people are the best in the business — and we’re proud to feature them in our podcasts. Our services are backed by thousands of successfully delivered engagements, elite certifications, and awards. And we’re pleased to share the talent and perspective of our staff as it relates to today’s emerging, transformative technologies. See how we can help you connect the dots between IT investments and business outcomes.
…
continue reading

1
297: Preparing for Data Privacy 2.0: What the Experts Aren’t Telling You - ClicData
24:01
24:01
Play later
Play later
Lists
Like
Liked
24:01Telmo Silva, CEO of ClicData, uncovers the hidden truths about the next wave of data privacy regulations—including the EU Data Act, GDPR updates, and the new AI Act. Telmo shares how smaller SaaS companies can prepare without drowning in legal confusion, how AI is becoming a vital tool for compliance, and why simply knowing Python won’t future-proo…
…
continue reading

1
296: 5 Trends That Will Separate Data Winners from Losers in 2025 - Yellowbrick Data
25:27
25:27
Play later
Play later
Lists
Like
Liked
25:27Mark Cusack, CTO of Yellowbrick Data unpacks the evolving data protection landscape. We explore the shift from cloud-first to cloud-optimized strategies, the power of private LLMs, the resurgence of data sovereignty, and how hybrid cloud is shaping enterprise resilience. Mark breaks down the critical role of Kubernetes, data governance, and the gro…
…
continue reading

1
Ep. 52 - Keeping the Lights On at Visa: How to Engineer for Reliability at Scale - with Divya Veerapandian
37:24
37:24
Play later
Play later
Lists
Like
Liked
37:24How do you ensure reliability across hybrid infrastructure when the cloud half isn’t fully in your control? In this episode, host Elias Voelker talks with Divya Veerapandian, Senior Director for Infrastructure Reliability Engineering and Global Head of Infrastructure Network Services at Visa. From network automation and hybrid observability to AI-d…
…
continue reading

1
295: How to Turn Your Backups Into Business Intelligence - Eon
21:49
21:49
Play later
Play later
Lists
Like
Liked
21:49Dr. Assaf Natanzon, VP and Chief Architect at Eon, joins host Demetrius to reveal how modern backups can go beyond storage and recovery to become a true source of insight. Hear how one company uncovered 20,000+ forgotten snapshots—and massive hidden costs—just by switching to Eon. Learn how AI-powered classification, policy-driven protection, and q…
…
continue reading

1
294: Why Cybersecurity Isn’t Just for Hackers Anymore - Aspen Institute
23:48
23:48
Play later
Play later
Lists
Like
Liked
23:48Yameen Huq, Director of Cybersecurity Programs at the Aspen Institute explores the often-overlooked non-technical skills needed in cybersecurity, the evolving cyber policy landscape in Washington D.C., and the critical importance of aligning cyber investments with real-world business outcomes. From AI-enhanced policy development to economic-driven …
…
continue reading

1
293: The Fear Every CISO Has But Rarely Admits - Loreta Today
25:19
25:19
Play later
Play later
Lists
Like
Liked
25:19Loreta Tarozaite, CEO & Founder at Loreta Today breaks down the human side of cybersecurity leadership. We explore the fear of failure among CISOs, the power of executive presence, and how communication—not just technical skills—is the real driver of trust in the boardroom. Loreta shares insights on overcoming imposter syndrome, building relationsh…
…
continue reading

1
Ep. 51 - IT for Human Rights: Scaling Secure Infrastructure for a Global Nonprofit – with Lydia Nicola
45:36
45:36
Play later
Play later
Lists
Like
Liked
45:36For Lydia Nicola’s IT team, a security breach isn’t just a risk—it could mean life or death for the people they protect. In this episode, Elias Voelker speaks with Lydia Nicola, Head of IT Operations at Amnesty International, about the unique challenges of running IT for a global nonprofit. Lydia shares how her team secures infrastructure in politi…
…
continue reading

1
292: Avoiding Cyber Disaster: Is Your Company DORA Compliant? - N2WS
22:17
22:17
Play later
Play later
Lists
Like
Liked
22:17Sebastian Straub, Principal Solutions Architect at N2WS, explores DORA (Digital Operational Resilience Act), emphasizing its stringent impact on financial institutions' cybersecurity. He highlights cloud-native backup strategies, cross-region and cross-account backups for disaster recovery, and the critical role of immutable backups against ransomw…
…
continue reading

1
291: Cloud Rewind: Because CTRL+Z Doesn’t Work on Ransomware - Commvault
29:40
29:40
Play later
Play later
Lists
Like
Liked
29:40Govind Rangasamy, Head of Recovery Solutions and VP of Portfolio Marketing at Commvault (via Appranix acquisition), talks about the terrifying reality of ransomware, cyber threats, and the illusion of traditional data protection. With 38,000+ ransomware variants evolving daily, simply backing up data isn’t enough—you need to rebuild, not just recov…
…
continue reading

1
290: Your Old Tapes Might Be a Goldmine for Hackers – Here’s Why! - Insurgo
21:00
21:00
Play later
Play later
Lists
Like
Liked
21:00Gavin Griffiths, Managing Director and Pat Mayock, VP of Sales at Insurgo dives into the hidden risks of tape storage and destruction. They expose shocking real-world security breaches—like school fingerprint records almost being sold—and discuss why traditional shredding and degaussing aren’t enough. Insurgo’s groundbreaking tech ensures data is t…
…
continue reading

1
289: The Enterprise Backup Industry’s Worst Nightmare? - S2|DATA
24:08
24:08
Play later
Play later
Lists
Like
Liked
24:08W. Curtis Preston, aka "Mr. Backup," reveals shocking insights from the world of data recovery. From a million-tape archive stored in a football-field-sized facility to the critical need for reading backup data without vendor lock-in, this conversation uncovers the hidden struggles of IT professionals. We dive into ransomware recovery, AI’s role in…
…
continue reading

1
288: From Data Chaos to Control: The Future of Cloud Backup - Backblaze
25:20
25:20
Play later
Play later
Lists
Like
Liked
25:20Gleb Budman, CEO & co-founder of Backblaze, discusses the future of data storage, cloud cost optimization, and resilience against cyber threats. Gleb shares his journey of bootstrapping Backblaze, competing against AWS, and ultimately taking the company public. We explore rising storage costs, AI-driven data explosion, ransomware defense strategies…
…
continue reading

1
287: The Secret Weapon NFL Teams Use for Game-Changing Decisions! - OSNEXUS
23:24
23:24
Play later
Play later
Lists
Like
Liked
23:24Steven Umbehocker, CEO of OSNEXUS discusses how businesses can protect critical data with object storage, immutability, and AI-powered automation. He dives into cybersecurity strategies, the role of AI in long-term data retention, and why enterprises must rethink storage for modern workloads. Plus, a fascinating look at how NFL teams leverage data …
…
continue reading

1
Ep. 50 - Data Center Efficiency: Monitoring, AI, and Decarbonization - with Martin Casaulta & Martin Hirschvogel
45:03
45:03
Play later
Play later
Lists
Like
Liked
45:03How can you drive data center efficiency without compromising performance? In this episode, host Elias Voelker sits down with Martin Casaulta, Chief Technologist at Hewlett Packard Enterprise Switzerland, and Martin Hirschvogel, Chief Product Officer at Checkmk. They discuss data center efficiency—from traditional metrics like PUE to the impact of …
…
continue reading

1
286: CEOs Beware: Ignoring Your Data Could Cost You Everything - The Data Group
22:24
22:24
Play later
Play later
Lists
Like
Liked
22:24Paul Graeve, CEO of The Data Group, discusses the hidden dangers of poor data management. We talk about why CEOs must take charge of their data strategy, how bad data can derail AI initiatives, and why fragmented data is silently draining company resources. Paul offers practical steps for leaders to regain control, unify their data, and turn it int…
…
continue reading

1
285: Hackers Are One Step Ahead – Can You Recover Your Backups? - DCIG
28:21
28:21
Play later
Play later
Lists
Like
Liked
28:21Jerome Wendt, CEO & Principal Analyst at DCIG, unpacks the latest trends in data protection. We dive into intermittent encryption, a stealthy new ransomware tactic, and how AI-driven anomaly detection is reshaping cybersecurity. Jerome also shares insights on VMware’s licensing shake-up, the rise of multi-hypervisor environments, and why backup sol…
…
continue reading

1
284: How to Stay Safe Online: The Growing Risk of Digital Impersonation in 2025 - Memcyco
19:43
19:43
Play later
Play later
Lists
Like
Liked
19:43Kate Cox, Business Development at Memcyco uncovers the alarming rise of digital impersonation attacks and the role AI plays in making scams more convincing than ever. We discuss how cybercriminals exploit AI to clone websites, steal data, and undermine consumer trust. Kate shares eye-opening statistics, real-world examples, and practical strategies…
…
continue reading

1
Ep. 49 – 90% First-Contact Resolution: How to Build a Secure, Efficient IT Helpdesk– with Peg Kearney
41:45
41:45
Play later
Play later
Lists
Like
Liked
41:45How do you hit 90% first-contact resolution—and keep it there? In this episode, Elias speaks with Peg Kearney, Director of IT Operations at the University of Arizona College of Nursing, about how her helpdesk team maintains a 90% first-contact resolution rate by hiring top talent and providing them with the right tools and system access. Peg also h…
…
continue reading

1
283: How Data Lakes and Deep Learning Are Revolutionizing Cybersecurity in 2025 - DeepTempo
24:34
24:34
Play later
Play later
Lists
Like
Liked
24:34Evan Powell, Founding CEO of DeepTempo, explores advancements in cybersecurity through the innovative use of Large Log Model (LogLM). He discusses the challenges of securing data amidst increasing cyber threats, the role of platforms like Snowflake in reducing data silos, and best practices for leveraging AI in threat detection. Powell emphasizes a…
…
continue reading

1
282: Shocking New Tactics Hackers Are Using to Steal Your Identity - Breez Security
19:40
19:40
Play later
Play later
Lists
Like
Liked
19:40Abhinav Srivastava, Founder and CEO of Breez Security delve into the rising importance of identity security in combating credential compromises and safeguarding cloud and SaaS platforms. Abhinav explains how to use behavioral identity telemetry and AI to enhance detection and response capabilities. The conversation explores persistent security chal…
…
continue reading

1
281: Your Phone Could Be the Perfect Target -- Here’s Why - Nuke from Orbit
22:27
22:27
Play later
Play later
Lists
Like
Liked
22:27James O'Sullivan, founder and CEO of Nuke from Orbit explore the hidden dangers of PIN usage and the risks posed when phones are stolen, emphasizing the underestimated security vulnerabilities in everyday mobile device usage. James shares the origin story of his company, born from a personal incident of phone theft, and details how Nuke from Orbit …
…
continue reading

1
Ep. 48 - From Surviving to Thriving: How a Major Cyberattack Sparked a Full IT Transformation - with Thomas Klithav Hansen
34:11
34:11
Play later
Play later
Lists
Like
Liked
34:11A major cyberattack led Blue Water Shipping to completely transform its IT infrastructure—and now, they're stronger than ever. In this episode, host Elias Voelker sits down with Thomas Klithav Hansen, Head of IT Operations at Blue Water Shipping, to discuss how the attack became the catalyst for a transformative IT journey. You’ll learn: 1. The rol…
…
continue reading

1
280: Protecting Backups and Future-Proofing Skills in Containers – IDC
26:17
26:17
Play later
Play later
Lists
Like
Liked
26:17Johnny Yu, Research Manager, Infrastructure Software Platforms, Worldwide Infrastructure Research at IDC dives into the challenges and strategies for backing up containerized workloads. We explore the evolution of container technology, differences from traditional backups, and the expertise gap in managing Kubernetes-based systems. Johnny discusses…
…
continue reading

1
279: Connecting AI and DevOps to Solve Modern Workflow Challenges - Jozu
19:59
19:59
Play later
Play later
Lists
Like
Liked
19:59Gorkem Ercan, CTO and Founding Distinguished Engineer at Jozu, shares insights into overcoming the challenges of integrating AI and ML into DevOps workflows, emphasizing the critical role of immutable artifacts in ensuring trust and efficiency. He introduces KitOps.ml, an open-source project designed to simplify the management of AI/ML artifacts an…
…
continue reading

1
278: Critical Mobile Vulnerabilities and How to Prevent Them - Appknox
25:24
25:24
Play later
Play later
Lists
Like
Liked
25:24Subho Halder, Co-founder and CEO of AppKnox, dives into the evolving challenges and trends in mobile app security. He shares insights into protecting sensitive data on mobile applications, addressing issues like man-in-the-middle attacks, insecure coding practices, and fake apps. He emphasizes the importance of integrating security into the Softwar…
…
continue reading

1
277: Why Business Continuity Plans Often Fail - Strata Identity
23:21
23:21
Play later
Play later
Lists
Like
Liked
23:21Eric Olden, Co-Founder and CEO of Strata Identity, dives into the challenges and innovations in identity management for multi-cloud environments. He explains the concept of identity orchestration, its role in zero-trust architecture, and the evolution of identity management from SAML to abstraction layers like IDQL and HEXA. Eric also highlights re…
…
continue reading

1
Ep. 47 - 35,000 to 130,000 Students in 5 Years: Scaling IT at Internationale Hochschule - with Thomas Singbartl
31:27
31:27
Play later
Play later
Lists
Like
Liked
31:27Since 2019, Thomas Singbartl, Head of Global IT Operations at Internationale Hochschule (IU), has supported the university's astonishing growth journey from 35,000 to 130,000 students. Join host Elias Voelker in this episode as Thomas shares how IT fueled IU’s exponential growth, why the term “digital transformation” no longer applies, and how Synt…
…
continue reading

1
276: When Hackers Hit Your Backups, This One Thing May Save You - Myota
25:12
25:12
Play later
Play later
Lists
Like
Liked
25:12Gabriel Gumbs, Chief Product Officer and President at Myota, unpacks the unsettling truths about immutability, the evolution of ransomware tactics, and why traditional backup systems are failing in the face of cyber threats. Discover a revolutionary approach to Polymorphic Immutability, designed to keep your data secure, recoverable, and cost-effec…
…
continue reading

1
275: From Open-Source to APIs: The Critical Decisions Behind SaaS Architecture - Fastbreak RFP
26:31
26:31
Play later
Play later
Lists
Like
Liked
26:31Peter Bonney, CEO and Founder of Fastbreak RFP, shares his journey in building a scalable SaaS platform for automating RFP responses using AI. Peter dives into the challenges of balancing innovation with the rapid evolution of foundational AI models, the trade-offs between open-source tools and third-party APIs, and the critical architectural decis…
…
continue reading

1
274: Preventing Breaches Through Smarter Detection Techniques - Vectra AI
25:49
25:49
Play later
Play later
Lists
Like
Liked
25:49David Brooks, Cyber Security Architect at Vectra AI discusses early adversary detection, the role of AI and machine learning in preventing breaches, and the importance of network traffic analysis. David shares insights into balancing technology and empathy in cybersecurity, the value of layered defense strategies, and advice for aspiring profession…
…
continue reading

1
Ep. 46 - IT for the City of Atlanta: Building Scalable and Resilient Systems - with Tameka Neely-Dudley
31:10
31:10
Play later
Play later
Lists
Like
Liked
31:10What can we learn about resilience, scalability, and workforce development from the IT organization of the 6th-largest metro in the US? In this episode, Tameka Neely-Dudley, Director of IT Infrastructure Operations and Service Delivery for the City of Atlanta, shares insights from her nearly 25-year career, beginning as an intern and growing into a…
…
continue reading

1
273: Critical Attack Vectors Every SMB Must Defend Against - Dropsuite
22:33
22:33
Play later
Play later
Lists
Like
Liked
22:33Mark Kirstein, Chief Product Officer at DropSuite discusses the evolving cyber threat landscape, particularly how SMBs are increasingly targeted by cybercriminals. He explains the rising importance of data protection and the critical role MSPs play in helping small businesses safeguard essential information. Mark shares insights on new attack vecto…
…
continue reading

1
272: Protecting the Next Generation of AI: Backup Challenges for Large Language Models - IDC
23:44
23:44
Play later
Play later
Lists
Like
Liked
23:44Phil Goodwin, IDC’s Research VP, explore the challenges of backing up AI environments, focusing on large language models. Phil highlights the limitations of traditional backup methods for dynamic AI systems and the industry's push for genuine AI-driven data protection. We discuss the roles of companies like Dell, Commvault, Rubrik, and Cohesity in …
…
continue reading

1
271: Guarding the Kingdom: Protecting Microsoft Entra ID and IAM Systems- Dropsuite
25:18
25:18
Play later
Play later
Lists
Like
Liked
25:18Bernard Clark, Senior Product Manager at DropSuite discusses the essential role of identity management and backup in today’s digital infrastructure. He highlights the critical need for organizations to protect Microsoft Entra ID, which he refers to as "the keys to the kingdom," underscoring its importance as a primary target for cyber threats. We e…
…
continue reading

1
Ep. 45 - The Metrics That Matter: Optimizing ITSM by Focusing on Customer Effort – with Huseyin Uysal
36:35
36:35
Play later
Play later
Lists
Like
Liked
36:35Which KPIs really matter in IT Service Management? In this episode, Elias sits down with Huseyin Uysal, Head of Global Service Desk at ISS, to uncover what separates successful IT service management from the rest. With a wealth of experience managing global teams and optimizing IT processes, Huseyin reveals the metrics that really matter, how custo…
…
continue reading

1
270: How AI is Reshaping Large-Scale Databases for the Next Generation - MongoDB
22:11
22:11
Play later
Play later
Lists
Like
Liked
22:11Pavel Duchovny, Lead Developer Advocate at MongoDB, discusses the role of AI stacks in modern application development. He explains how MongoDB integrates into the AI stack, focusing on operational and vector databases, and shares best practices for managing vector data and optimizing storage. He also covers MongoDB's innovative security features li…
…
continue reading

1
269: You’re Not as Protected as You Think: The Dark Side of SaaS - HYCU
24:45
24:45
Play later
Play later
Lists
Like
Liked
24:45Simon Taylor, CEO of HYCU discusses the state of SaaS resilience and the critical need for SaaS data protection. We discuss insights from a recent report surveying over 417 IT decision-makers worldwide. Simon shares the shocking statistic that 61% of ransomware attacks occur through SaaS services, challenging the assumption that SaaS data is inhere…
…
continue reading

1
Ep. 44 - Mature ITSM: How to Drive Top-Down Change and Build Well-Oiled IT Operations - With Haroon Hasan
39:01
39:01
Play later
Play later
Lists
Like
Liked
39:01What separates a well-oiled IT operation from one constantly putting out fires? In this episode, we dive deep into the world of IT Service Management (ITSM) with Haroon Hasan, author of "Choose to Lead" and Director of IT Service Management and Governance at Computacenter. With 20+ years of experience, Haroon shares insights on optimizing ITSM for …
…
continue reading

1
268: How This CEO Grew a Cybersecurity Empire from His Brother’s Garage - Stimulus Technologies
25:27
25:27
Play later
Play later
Lists
Like
Liked
25:27Nathan Whittacre, CEO of Stimulus Technologies discusses evolving cybersecurity threats, strategies to safeguard businesses, and how companies can foster a culture of cybersecurity awareness. He shares insights on managing cross-site tokenization attacks, the role of AI in both generating and defending against cyber threats, and best practices for …
…
continue reading

1
267: Why the Data Lakehouse Is the Future—But What’s Stopping It from Getting There? - Upsolver
26:37
26:37
Play later
Play later
Lists
Like
Liked
26:37Ori Rafael, CEO and co-founder of Upsolver explores the future of data management through data lakehouses. He explains the evolution of the lakehouse, a revolutionary architecture that combines the best of data lakes and warehouses. You will gain insights into key technologies like Apache Iceberg, how lakehouses enable advanced use cases such as AI…
…
continue reading

1
Ep. 43 - Scaling Without the Cloud: How Sofascore Manages Millions of Real-Time Requests with Clever Caching - with Josip Stuhli
54:41
54:41
Play later
Play later
Lists
Like
Liked
54:41What happens when your infrastructure faces a live peak of millions of users worldwide—without cloud scalability? In this episode, Sofascore’s CTO Josip Stuhli breaks down how his team navigates massive traffic surges, optimizes caching, and saves big by ditching the cloud while still delivering real-time updates to 25 million monthly users. You'll…
…
continue reading

1
266: Crucial Cybersecurity Advisory Before, During & After the Election - SolCyber
26:37
26:37
Play later
Play later
Lists
Like
Liked
26:37Scott McCrady, CEO of SolCyber discusses managed cybersecurity services, rising cyber insurance costs, and the impact of geopolitical conflicts on cybersecurity. He shares insights on how organizations can reduce risks and improve response strategies, especially in today's uncertain political and economic landscape. Scott also addresses the role of…
…
continue reading

1
265: Generative AI & Data Privacy: How Companies Can Build Consumer Trust in 2025 - DataGrail
23:37
23:37
Play later
Play later
Lists
Like
Liked
23:37Daniel Barber, CEO of DataGrail delves into the founding of DataGrail, the challenges enterprises face in managing privacy, and how regulations like GDPR and CCPA impact the collection and processing of personal data. The conversation highlights the significance of consent in the digital age, the role of generative AI in data processing, and the ne…
…
continue reading

1
Ep. 42 - Integrating Cybersecurity with Operations: Ensuring Impact and Efficiency at UNICEF USA - with Andrew Nuxoll
41:12
41:12
Play later
Play later
Lists
Like
Liked
41:12Successful cybersecurity isn’t about heroics, it’s about preventing disasters you’ll never hear about. In this episode, Andrew Nuxoll, Managing Director of IT Operations and Cybersecurity at UNICEF USA, shares his journey from working at various managed service providers to leading cybersecurity efforts at a global NGO. Andrew offers insights into …
…
continue reading

1
264: Authorization vs Authentication: What You Need to Know for Cybersecurity - AuthZed
26:42
26:42
Play later
Play later
Lists
Like
Liked
26:42Jake Moshenko, Co-founder and CEO of AuthZed discusses the challenges of application security, focusing on the critical difference between authorization and authentication, and how these play a role in modern cybersecurity. He also touches on topics like ransomware threats, AI in cybersecurity, and trends in the job market, providing insightful adv…
…
continue reading

1
263: Immutable Data, Infinite Possibilities: The Decentralized Storage Revolution - Akave.io
28:07
28:07
Play later
Play later
Lists
Like
Liked
28:07Stefaan Vervaet, CEO of Akave.ai discusses the revolutionary impacts of decentralized compute, immutability, and blockchain technology in data storage and protection. Stefaan shares insights on how Akave.ai is leveraging blockchain to create a decentralized storage solution that ensures data integrity and immutability, making it particularly valuab…
…
continue reading

1
Ep. 41 - IT Leadership in Higher Education: Strategies for Service Management, Optimal Customer Experiences, and Employee Growth - with Mark Katsouros
1:08:42
1:08:42
Play later
Play later
Lists
Like
Liked
1:08:42How can universities navigate the complexities of service delivery while pursuing growth and innovation? Mark Katsouros, Senior Director for IT Engineering and Operations at Duquesne University, brings nearly 40 years of higher education IT experience. From the University of Maryland to pivotal roles at the University of Iowa and Penn State, Mark h…
…
continue reading

1
262: The Intersection of Hiring Trends in Cloud, Cybersecurity, and Disaster Recovery - Arpio
19:05
19:05
Play later
Play later
Lists
Like
Liked
19:05Doug Neumann, co-founder and CEO of Arpio, discusses how Arpio differentiates itself by offering a turnkey disaster recovery solution that addresses modern cloud architectures. He shares insights on navigating economic turbulence, the evolution of cybersecurity threats, and how Arpio is leveraging AI to accelerate ransomware recovery.…
…
continue reading

1
261: The Fastest Emerging Unseen Attack Surface: The Next Big Cyber Risk - FireTail
27:06
27:06
Play later
Play later
Lists
Like
Liked
27:06Jeremy Snyder, founder and CEO of FireTail, joins the show to discuss the rising importance of API security in a world where over 80% of internet requests are API calls. Jeremy shares his journey from launching FireTail to becoming a leading voice in cybersecurity, providing insights into how organizations can protect their APIs from increasingly c…
…
continue reading

1
260: How to Overcome the Hiring Trust Gap: Secrets from a Former Google Engineer - Morgan Latimer Consulting
26:19
26:19
Play later
Play later
Lists
Like
Liked
26:19Anthony Mays, a former Google software engineer and the founder of Morgan Latimer Consulting shares his inspiring journey from growing up in Compton and overcoming personal challenges to becoming a successful technologist. Discover the strategies that can be used to overcome the trust gap in hiring and land top roles. Learn how to build credibility…
…
continue reading