
Sign up to save your podcasts
Or


Kyle (CEO & President at CIT) and Brett (VP of Technical Sales at Genians) join us to discuss recurring and emerging security challenges, including protecting the inside of the network, visibility into who and what is connected, and meeting audit requirements in regulated industries like credit unions and manufacturing. They discuss how VPN zero-days and compromises render perimeter-only defenses insufficient, emphasizing network access control (NAC), device trust policies, alerts, segmentation, and zero-trust principles such as least privilege. They note many organizations lack accurate asset inventories and are surprised by the number of connected devices, including rogue or unmanaged equipment. For prioritization, they recommend starting with core best practices (firewalls, EDR, MFA) and moving toward NAC and ZTNA-style remote access as VPN risk increases. They also cover budget and complexity barriers, product overlap, analysis paralysis, and practical AI adoption examples like Slack AI and Microsoft Copilot for search.
Learn more about Genians: https://www.citsolutions.net/about-computer-integration-technologies/partners/genians/
00:00 Security Challenges Today
01:18 Inside Network Threats
03:14 VPN Zero Days Defense
04:13 Why Problems Persist
08:40 Prioritizing Security Steps
10:50 Budget and Complexity Barriers
13:34 Hidden Devices Discovery
18:05 Common Missteps and Overlap
19:48 Practical AI Use Cases
24:08 Action Steps and Wrap Up
By Computer Integration Technologies (CIT)Kyle (CEO & President at CIT) and Brett (VP of Technical Sales at Genians) join us to discuss recurring and emerging security challenges, including protecting the inside of the network, visibility into who and what is connected, and meeting audit requirements in regulated industries like credit unions and manufacturing. They discuss how VPN zero-days and compromises render perimeter-only defenses insufficient, emphasizing network access control (NAC), device trust policies, alerts, segmentation, and zero-trust principles such as least privilege. They note many organizations lack accurate asset inventories and are surprised by the number of connected devices, including rogue or unmanaged equipment. For prioritization, they recommend starting with core best practices (firewalls, EDR, MFA) and moving toward NAC and ZTNA-style remote access as VPN risk increases. They also cover budget and complexity barriers, product overlap, analysis paralysis, and practical AI adoption examples like Slack AI and Microsoft Copilot for search.
Learn more about Genians: https://www.citsolutions.net/about-computer-integration-technologies/partners/genians/
00:00 Security Challenges Today
01:18 Inside Network Threats
03:14 VPN Zero Days Defense
04:13 Why Problems Persist
08:40 Prioritizing Security Steps
10:50 Budget and Complexity Barriers
13:34 Hidden Devices Discovery
18:05 Common Missteps and Overlap
19:48 Practical AI Use Cases
24:08 Action Steps and Wrap Up