
Sign up to save your podcasts
Or
Cyber security is a massive part of being digitally agile. How secure is your data? Join host Todd Weyandt and guest Phil Keeney as they discuss trends in cybersecurity, practical steps towards implementing cybersecurity, the importance of resiliency, important commitments to map out before obtaining CMMC, the definition of digital agility, and how to truly understand innovation.
Phil Keeney leads the Stambaugh Ness TechSolutions team, providing technology consulting and implementation to over 800 clients including the architecture and engineering, not-for-profit, governmental, and health care industries. Working closely with clients, Phil develops innovative solutions designed to contribute to the company’s overall growth and profitability. Phil manages and deploys technology initiatives for clients via ERP, EDI, and CRM, as well as developing and managing all aspects of their technological infrastructure, technology inventory and staff. His years of experience also includes performing IT security audits, intrusion/penetration testing, and long-term strategic planning.
5
3030 ratings
Cyber security is a massive part of being digitally agile. How secure is your data? Join host Todd Weyandt and guest Phil Keeney as they discuss trends in cybersecurity, practical steps towards implementing cybersecurity, the importance of resiliency, important commitments to map out before obtaining CMMC, the definition of digital agility, and how to truly understand innovation.
Phil Keeney leads the Stambaugh Ness TechSolutions team, providing technology consulting and implementation to over 800 clients including the architecture and engineering, not-for-profit, governmental, and health care industries. Working closely with clients, Phil develops innovative solutions designed to contribute to the company’s overall growth and profitability. Phil manages and deploys technology initiatives for clients via ERP, EDI, and CRM, as well as developing and managing all aspects of their technological infrastructure, technology inventory and staff. His years of experience also includes performing IT security audits, intrusion/penetration testing, and long-term strategic planning.
1,830 Listeners
30,839 Listeners
26,159 Listeners
2,395 Listeners
25,864 Listeners
2,120 Listeners
111,864 Listeners
9,568 Listeners
10,141 Listeners
20 Listeners
2,189 Listeners
2,137 Listeners
7 Listeners
16,962 Listeners
84 Listeners