Cover image of show DEFENDER

DEFENDER

Podcast by DefenderVideo.com

English

News & politics

Limited Offer

2 months for 19 kr.

Then 99 kr. / monthCancel anytime.

  • 20 hours of audiobooks / month
  • Podcasts only on Podimo
  • All free podcasts
Get Started

About DEFENDER

Welcome to Defender, the podcast that brings you crowd-sourced physical security insights and commentary from leading industry professionals to help you protect lives, secure property, and defend against evolving threats. www.defendervideo.com

All episodes

16 episodes

episode Unlocking LinkedIn's Potential with Tyler Schmoker artwork

Unlocking LinkedIn's Potential with Tyler Schmoker

Join Dave and Tyler for a different side of the physical security industry—LinkedIn. In this episode of the Defender Podcast, Dave sits down with Tyler Schmoker [https://www.linkedin.com/in/tyler-schmoker-76997756/], an Army veteran, security professional, and entrepreneur. With over two decades of experience in security management and consulting, Tyler has a wealth of knowledge to share about navigating LinkedIn as a physical security professional. Tyler discusses his approach to developing his network and emphasizes the importance of professional development in the security field. He explains how leveraging LinkedIn can significantly enhance career opportunities and shares actionable strategies for creating an impactful LinkedIn profile, engaging with industry content, and building a professional network that can lead to new connections and career advancements. Watch or listen to the full episode on Defender.Video to learn how to elevate your professional presence and expand your connections in our growing industry! This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit www.defendervideo.com/subscribe [https://www.defendervideo.com/subscribe?utm_medium=podcast&utm_campaign=CTA_2]

29 Oct 2024 - 1 h 14 min
episode Inside Colocation: Doug Dreher on Security Challenges and Solutions artwork

Inside Colocation: Doug Dreher on Security Challenges and Solutions

With the rapid growth of hyperscalers, understanding how to effectively manage security in these shared environments is more important than ever. Defining the Security Landscape Colocation facilities are designed to house multiple clients' IT infrastructure within a single space. This shared environment necessitates a comprehensive threat analysis to identify potential vulnerabilities. Doug emphasized the importance of leveraging clean data versus dirty data and utilizing paid intelligence analysis to inform security strategies. Key Security Considerations * Physical Security Measures: The exterior of colocation facilities often lacks adequate physical barriers. Issues such as fencing regulations imposed by Authorities Having Jurisdiction (AHJ) can complicate security efforts. Organizations must assess whether they have staffed guard booths or effective intercom systems in place. * Access Control Protocols: A robust access control system is essential. This includes evaluating how vehicles are vetted upon entry and whether facilities utilize mantraps or other layers of protection. Doug highlighted that many colocations are hesitant to disclose details about their camera systems without a non-disclosure agreement (NDA). * Infrastructure Assessment: Understanding the facility's construction—whether multistory or discreetly located—plays a significant role in risk management. Key factors such as power distribution, cooling methods, and backup systems must be evaluated for resilience and continuity of operations. * Interior Security Features: Inside colocation facilities, cages protect critical assets but may lack mantraps, which can expose vulnerabilities. It's crucial to assess how access control is managed across multiple tenants and how security providers monitor these systems. * Construction Phase: Doug emphasized the critical importance of the “construction security piece” phase in security management for colocation facilities. This involves meticulous planning and execution to ensure that security measures are integrated from the ground up. Advanced Security Solutions Doug discussed the necessity of implementing multiple layers of access control, including programmable lockers and advanced scanning technologies like millimeter-wave scanners for personnel. He also stressed the importance of encryption and robust incident management protocols to protect against unauthorized access. Future-Proofing Security Infrastructure As technology evolves, so must our approach to securing colocation facilities. Doug pointed out that integrating intelligent systems capable of real-time threat detection can significantly enhance security posture. Proactive measures are essential; better a false alarm than a post-incident report. Bottom Line The conversation with Doug reinforced that as organizations rely on colocation facilities, physical security leaders must adapt their strategies to meet the challenges. By prioritizing thorough assessments, leveraging technology, and fostering collaboration between IT and security teams, businesses can effectively safeguard their critical infrastructure. Thanks for tuning in! This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit www.defendervideo.com/subscribe [https://www.defendervideo.com/subscribe?utm_medium=podcast&utm_campaign=CTA_2]

10 Oct 2024 - 1 h 11 min
episode Chuck Randolph: Building a Risk-Aware Culture and Fostering Collaboration artwork

Chuck Randolph: Building a Risk-Aware Culture and Fostering Collaboration

In this episode, we welcome Chuck Randolph, Chief Security Officer with Ontic, with an impressive background in Corporate Security, U.S. Department of State and Military. Together, we discuss the various threat vectors, how security can unify the effort for organizations to become threat aware, and the power of our security networks if incidents occur. Chuck emphasizes the need for a unified approach involving various departments like HR, legal, cyber, and physical security. He shares insights on mitigating risks through assessment, governance, monitoring, and education. He also highlights the role of technology and the critical need for a common operating picture. Key takeaway: building a risk-aware culture and fostering collaboration across departments are crucial in managing insider threats effectively. Follow Chuck Randolph here. https://www.linkedin.com/in/chuckrandolph/ Conversations In Close Protection Podcast The Ontic Protective Intelligence Podcast Subscribe to Defender and stay informed, don't forget to check out defender.video for more detailed insights into enterprise-level security. This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit www.defendervideo.com/subscribe [https://www.defendervideo.com/subscribe?utm_medium=podcast&utm_campaign=CTA_2]

30 Sep 2024 - 56 min
episode Lee Odess: Defining Modern Access Control and Its Growing Impact artwork

Lee Odess: Defining Modern Access Control and Its Growing Impact

In this episode of Defender, David Marsh welcomes Lee Odess, CEO of Access Control Executive Brief [https://www.leeodess.com/executivebrief], to discuss his background in the security industry and his journey to becoming an international speaker and thought leader in the access control space. Key topics covered in this episode include: We explore the significant transformations in the access control market, especially with the rise of modern access control with cloud, mobile, and wallet (Apple, Google and Samsung), and what that means for the industry. Lee emphasizes the need for the industry to adapt to modern enterprise demands, integrate new players, and embrace a hybrid approach between on-site and cloud solutions. He also highlights the importance of improving user experience and streamlining the deployment of best-in-class technologies. The discussion concludes with recommendations for security managers on updating their systems and the promising future prospects in the access control industry. Subscribe to Defender for more in-depth discussions on the cutting edge of security technology, and visit our website for additional insights into enterprise-level security solutions. Thank you for reading DEFENDER. This post is public so feel free to share it. This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit www.defendervideo.com/subscribe [https://www.defendervideo.com/subscribe?utm_medium=podcast&utm_campaign=CTA_2]

1 Aug 2024 - 43 min
En fantastisk app med et enormt stort udvalg af spændende podcasts. Podimo formår virkelig at lave godt indhold, der takler de lidt mere svære emner. At der så også er lydbøger oveni til en billig pris, gør at det er blevet min favorit app.
En fantastisk app med et enormt stort udvalg af spændende podcasts. Podimo formår virkelig at lave godt indhold, der takler de lidt mere svære emner. At der så også er lydbøger oveni til en billig pris, gør at det er blevet min favorit app.
Rigtig god tjeneste med gode eksklusive podcasts og derudover et kæmpe udvalg af podcasts og lydbøger. Kan varmt anbefales, om ikke andet så udelukkende pga Dårligdommerne, Klovn podcast, Hakkedrengene og Han duo 😁 👍
Podimo er blevet uundværlig! Til lange bilture, hverdagen, rengøringen og i det hele taget, når man trænger til lidt adspredelse.

Choose your subscription

Most popular

Limited Offer

Premium

20 hours of audiobooks

  • Podcasts only on Podimo

  • No ads in Podimo shows

  • Cancel anytime

2 months for 19 kr.
Then 99 kr. / month

Get Started

Premium Plus

Unlimited audiobooks

  • Podcasts only on Podimo

  • No ads in Podimo shows

  • Cancel anytime

Start 7 days free trial
Then 129 kr. / month

Start for free

Only on Podimo

Popular audiobooks

Get Started

2 months for 19 kr. Then 99 kr. / month. Cancel anytime.