
Sign up to save your podcasts
Or


Cyber security is a massive part of being digitally agile. How secure is your data? Join host Todd Weyandt and guest Phil Keeney as they discuss trends in cybersecurity, practical steps towards implementing cybersecurity, the importance of resiliency, important commitments to map out before obtaining CMMC, the definition of digital agility, and how to truly understand innovation.
Phil Keeney leads the Stambaugh Ness TechSolutions team, providing technology consulting and implementation to over 800 clients including the architecture and engineering, not-for-profit, governmental, and health care industries. Working closely with clients, Phil develops innovative solutions designed to contribute to the company’s overall growth and profitability. Phil manages and deploys technology initiatives for clients via ERP, EDI, and CRM, as well as developing and managing all aspects of their technological infrastructure, technology inventory and staff. His years of experience also includes performing IT security audits, intrusion/penetration testing, and long-term strategic planning.
By Applied Software5
3030 ratings
Cyber security is a massive part of being digitally agile. How secure is your data? Join host Todd Weyandt and guest Phil Keeney as they discuss trends in cybersecurity, practical steps towards implementing cybersecurity, the importance of resiliency, important commitments to map out before obtaining CMMC, the definition of digital agility, and how to truly understand innovation.
Phil Keeney leads the Stambaugh Ness TechSolutions team, providing technology consulting and implementation to over 800 clients including the architecture and engineering, not-for-profit, governmental, and health care industries. Working closely with clients, Phil develops innovative solutions designed to contribute to the company’s overall growth and profitability. Phil manages and deploys technology initiatives for clients via ERP, EDI, and CRM, as well as developing and managing all aspects of their technological infrastructure, technology inventory and staff. His years of experience also includes performing IT security audits, intrusion/penetration testing, and long-term strategic planning.

91,069 Listeners

32,129 Listeners

30,646 Listeners

26,211 Listeners

154,142 Listeners

4,402 Listeners

270 Listeners

87,299 Listeners

112,539 Listeners

56,431 Listeners

8,717 Listeners

10,227 Listeners

50 Listeners

29,203 Listeners

16,043 Listeners