
Sign up to save your podcasts
Or


Cyber security is a massive part of being digitally agile. How secure is your data? Join host Todd Weyandt and guest Phil Keeney as they discuss trends in cybersecurity, practical steps towards implementing cybersecurity, the importance of resiliency, important commitments to map out before obtaining CMMC, the definition of digital agility, and how to truly understand innovation.
Phil Keeney leads the Stambaugh Ness TechSolutions team, providing technology consulting and implementation to over 800 clients including the architecture and engineering, not-for-profit, governmental, and health care industries. Working closely with clients, Phil develops innovative solutions designed to contribute to the company’s overall growth and profitability. Phil manages and deploys technology initiatives for clients via ERP, EDI, and CRM, as well as developing and managing all aspects of their technological infrastructure, technology inventory and staff. His years of experience also includes performing IT security audits, intrusion/penetration testing, and long-term strategic planning.
By Applied Software5
3030 ratings
Cyber security is a massive part of being digitally agile. How secure is your data? Join host Todd Weyandt and guest Phil Keeney as they discuss trends in cybersecurity, practical steps towards implementing cybersecurity, the importance of resiliency, important commitments to map out before obtaining CMMC, the definition of digital agility, and how to truly understand innovation.
Phil Keeney leads the Stambaugh Ness TechSolutions team, providing technology consulting and implementation to over 800 clients including the architecture and engineering, not-for-profit, governmental, and health care industries. Working closely with clients, Phil develops innovative solutions designed to contribute to the company’s overall growth and profitability. Phil manages and deploys technology initiatives for clients via ERP, EDI, and CRM, as well as developing and managing all aspects of their technological infrastructure, technology inventory and staff. His years of experience also includes performing IT security audits, intrusion/penetration testing, and long-term strategic planning.

90,955 Listeners

32,005 Listeners

30,681 Listeners

26,217 Listeners

153,513 Listeners

4,403 Listeners

269 Listeners

87,279 Listeners

112,238 Listeners

56,524 Listeners

8,462 Listeners

10,202 Listeners

51 Listeners

29,188 Listeners

15,859 Listeners