<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0">
  <channel>
    <atom:link href="http://www.technologyfirst.org/page-18098/BlogPost/5558983/RSS" rel="self" type="application/rss+xml" />
    <title>Technology First Blog</title>
    <link>https://www.technologyfirst.org/</link>
    <description>Technology First blog posts</description>
    <dc:creator>Technology First</dc:creator>
    <generator>Wild Apricot - membership management software and more</generator>
    <language>en</language>
    <pubDate>Thu, 09 Apr 2026 20:19:04 GMT</pubDate>
    <lastBuildDate>Thu, 09 Apr 2026 20:19:04 GMT</lastBuildDate>
    <item>
      <pubDate>Thu, 26 Mar 2026 18:05:42 GMT</pubDate>
      <title>Mind The Gap: The Latest on Labor</title>
      <description>&lt;blockquote&gt;
  &lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/2026/Cassie%20Barlow%20-%20April%202026%20copy.png" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
  &lt;li style="list-style: none; display: inline"&gt;
    &lt;p&gt;&lt;font face="Red Hat Display"&gt;&lt;font style="font-size: 16px;" face="Red Hat Display" color="#2C3333"&gt;I’m sure you have heard the trending news by now……the United States is experiencing a labor shortage that is affecting many industries like manufacturing, logistics, healthcare, transportation and agriculture&lt;a href="#_ftn1" name="_ftnref1" style=""&gt;&lt;font&gt;&lt;sup&gt;&lt;sup&gt;&lt;font style="font-size: 16px;"&gt;[1]&lt;/font&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/font&gt;&lt;/a&gt;.&amp;nbsp; This news has been reported in regional newspapers, business magazines as well as trade journals. These industries should sound very familiar to you as they are all very much in demand in most markets across the country.&amp;nbsp; What is causing this shortage?&amp;nbsp; What can employers do about the shortage? The cause is a result of several different factors like our nation’s aging population, low unemployment, people opting out of the workforce, working conditions, skills gaps and the school to job pipeline.&amp;nbsp; There is good news in many of these causative factors.&amp;nbsp; Employers across the country still have a lot of control with many of the factors leading to shortages, and they can grab the bull by the horns with robust workforce planning for their company.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;p&gt;&lt;font&gt;&lt;u&gt;&lt;font face="Red Hat Display" color="#057091" style="font-size: 18px;"&gt;&lt;strong&gt;Workforce Planning Primer&lt;/strong&gt;&lt;/font&gt;&lt;/u&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;p&gt;&lt;font style="font-size: 16px;" face="Red Hat Display" color="#2C3333"&gt;The Society for Human Resources Management advocates for all companies to practice the art of workforce planning&lt;a href="#_ftn2" name="_ftnref2" style=""&gt;&lt;font&gt;&lt;sup&gt;&lt;sup&gt;&lt;font style="font-size: 16px;"&gt;[2]&lt;/font&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/font&gt;&lt;/a&gt;. There is no specific formula for assisting with workforce planning because every company has very different needs, based on their culture, their strategic plan and their goals and objectives.&amp;nbsp; With this said, your company can develop a workforce plan that can assist in guiding your company to a robust workforce pipeline that will better position your company for accomplishing your goals and objectives. The steps in the planning process are very straightforward:&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;font face="Red Hat Display" color="#2C3333"&gt;&lt;span style=""&gt;1.&lt;/span&gt;&lt;font style="font-family: &amp;quot;Red Hat Display&amp;quot;; font-size: 9px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; &lt;font&gt;&lt;font style="font-family: &amp;quot;Red Hat Display&amp;quot;; font-size: 16px;"&gt;Conduct a supply analysis.&lt;br&gt;&lt;/font&gt;&lt;span style=""&gt;2.&lt;/span&gt;&lt;font style="font-family: &amp;quot;Red Hat Display&amp;quot;; font-size: 9px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; &lt;font style="font-family: &amp;quot;Red Hat Display&amp;quot;; font-size: 16px;"&gt;Conduct a demand analysis.&lt;br&gt;&lt;/font&gt;&lt;span style=""&gt;3.&lt;/span&gt;&lt;font style="font-family: &amp;quot;Red Hat Display&amp;quot;; font-size: 9px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; &lt;font style="font-family: &amp;quot;Red Hat Display&amp;quot;; font-size: 16px;"&gt;Conduct a gap analysis.&lt;br&gt;&lt;/font&gt;&lt;span style=""&gt;4.&lt;/span&gt;&lt;font style="font-family: &amp;quot;Red Hat Display&amp;quot;; font-size: 9px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; &lt;font style="font-family: &amp;quot;Red Hat Display&amp;quot;; font-size: 16px;"&gt;Formulate a solution (plan).&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;font face="Red Hat Display" style="font-size: 16px;" color="#2C3333"&gt;The purpose of the supply analysis is to ensure your company knows the regional and national suppliers of potential employees for your company. This analysis should look at the numbers available and skills and should also look at demographics to include generational representation. This analysis will help your company with projections for the future based upon retirements and resignations, and it can also assist in examining different types of workforce that can be tapped into (e.g. new graduates, upskilling of current employees, veterans, people with disabilities, older adults, reentered citizens, and new Americans). Through the examination and utilization of all of these categories, you can create a very resilient workforce for your company.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Red Hat Display" style="font-size: 16px;" color="#2C3333"&gt;The demand analysis will help you to design your future workforce composition. This is where your strategic plan will come in handy to ensure you are recruiting your required skillsets in response to your new and expanded business.&amp;nbsp; This is the analysis where you are asking yourself about the skillsets and experience that you need in your company in all of your positions. You’ll want to review your job descriptions very closely to ensure they are accurate and offer your company ultimate flexibility.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Red Hat Display" style="font-size: 16px;" color="#2C3333"&gt;The gap analysis makes a comparison between what you said you need in your demand analysis and what is available through your supply analysis.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Red Hat Display" style="font-size: 16px;" color="#2C3333"&gt;Last but not least is your solution analysis.&amp;nbsp; Your solution should include how you plan to recruit to meet your needs, as well as plans for upskilling current employees and potentially tapping into new resources that maybe your company has never tapped into in the past.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font&gt;&lt;u&gt;&lt;font face="Red Hat Display" color="#057091" style="font-size: 18px;"&gt;&lt;strong style=""&gt;Easy to find Labor Resource&lt;/strong&gt;&lt;/font&gt;&lt;/u&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Red Hat Display" style="font-size: 16px;" color="#2C3333"&gt;One readily available resource in every market is students at all levels of education. High School through Graduate Students across the country are looking for work-based learning opportunities that will help them to discern their appropriate career choices. In Ohio, we are really lucky to have about 400K High School students in our State and close to 400K College and University students.&amp;nbsp; Imagine if we could keep the vast majority of these students in our State.&amp;nbsp; Our labor shortage in Ohio would be long gone!&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Red Hat Display" style="font-size: 12px;" color="#2C3333"&gt;&lt;font style=""&gt;Cassie is President of The Strategic Ohio Council for Higher Education (SOCHE), a non-profit organization that specializes in assisting employers to recruit, train, employ, develop, and manage interns. After 59 years in business, SOCHE knows that today’s interns are tomorrow’s workforce!&amp;nbsp; If you’re looking for talent, let SOCHE help connect you with your next generation of workforce.&amp;nbsp; Reach out to&lt;/font&gt; &lt;a href="mailto:soche@soche.org" style="" target="_blank"&gt;&lt;font&gt;soche@soche.org&lt;/font&gt;&lt;/a&gt; &lt;font style=""&gt;or&lt;/font&gt; &lt;a href="http://www.soche.org" style="" target="_blank"&gt;&lt;font&gt;www.soche.org&lt;/font&gt;&lt;/a&gt;&lt;font style=""&gt;.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Red Hat Display" style="font-size: 13px;" color="#2C3333"&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;font&gt;&lt;sup&gt;&lt;sup&gt;&lt;font style="font-size: 13px;"&gt;[1]&lt;/font&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/font&gt;&lt;/a&gt; https://www.uschamber.com/workforce/understanding-americas-labor-shortage&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Red Hat Display" style="font-size: 13px;" color="#2C3333"&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;font&gt;&lt;sup&gt;&lt;sup&gt;&lt;font style="font-size: 13px;"&gt;[2]&lt;/font&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/font&gt;&lt;/a&gt; https://www.shrm.org/topics-tools/tools/toolkits/practicing-discipline-workforce-planning&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13614059</link>
      <guid>https://www.technologyfirst.org/Tech-News/13614059</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Sun, 01 Mar 2026 16:25:29 GMT</pubDate>
      <title>Closing the Accountability Gap: Why Automation and Cyber Risk Transfer Must Evolve Together</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/2026/Michael%20Benzinger%20Blog%20March%20%202026.png" alt="" title="" border="0"&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li style="list-style: none; display: inline"&gt;
    &lt;p&gt;&lt;font color="#2C3333"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 15px;"&gt;AI is no longer experimental. According to the 2026 Software Lifecycle Engineering Decision Maker Survey, 76.6% of organizations are actively using AI in development workflows, with another 20.4% evaluating its implementation. Only 3.1% remain disengaged.&lt;/font&gt;&lt;font face="Verdana, sans-serif" style="font-size: 15px;"&gt;&amp;nbsp;[ 1]&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;p&gt;&lt;font face="Verdana, sans-serif" color="#2C3333" style="font-size: 15px;"&gt;Automation and AI have reshaped how we build, deploy, and protect software. From speeding up code delivery to enhancing threat detection, these systems promise speed, consistency, and scale. But automation isn’t infallible—and when it goes wrong, because it has, the consequences ripple across entire industries. This raises an important question: &lt;strong style=""&gt;&lt;em style=""&gt;who is accountable when automated systems fail, and how should we rethink risk transfer in response?&lt;/em&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;h2 style="line-height: 20px;"&gt;&lt;strong&gt;&lt;font face="Verdana, sans-serif" color="#057091" style="font-size: 17px;"&gt;When Automation Fails at Scale&lt;/font&gt;&lt;/strong&gt;&lt;/h2&gt;

    &lt;p&gt;&lt;font face="Verdana, sans-serif" color="#000000" style="font-size: 15px;"&gt;In July 2024, a routine security update triggered a global technology outage that left millions of Windows machines unusable overnight. A flawed configuration update for the widely deployed endpoint security agent caused systems to crash into boot loops, disrupting airlines, hospitals, broadcasters, banking systems, and emergency services.&lt;/font&gt;&lt;/p&gt;

    &lt;p&gt;&lt;font face="Verdana, sans-serif" color="#000000" style="font-size: 15px;"&gt;The root cause? A bug in the internal validation process—a tool meant to ensure updates were safe. Instead, it mistakenly allowed a defective update to reach customers’ systems. This wasn’t a cyberattack. It was a failure of automated testing and quality assurance.&lt;/font&gt;&lt;/p&gt;

    &lt;p&gt;&lt;font face="Cambria, serif" style="font-size: 15px;"&gt;&lt;font face="Verdana, sans-serif" style="color: rgb(0, 0, 0);"&gt;The fallout was vast even with a swift response. While many systems were restored within days, the financial toll on individual organizations was significant. Delta Air Lines alone claimed&lt;/font&gt; &lt;a href="https://www.reuters.com/sustainability/boards-policy-regulation/delta-can-sue-crowdstrike-over-computer-outage-that-caused-7000-canceled-flights-2025-05-19/?utm_source=chatgpt.com" style=""&gt;&lt;font face="Verdana, sans-serif" style=""&gt;&lt;font style="" color="#057091"&gt;hundreds of millions of dollars&lt;/font&gt;&lt;/font&gt;&lt;/a&gt; &lt;font face="Verdana, sans-serif" style="color: rgb(0, 0, 0);"&gt;in losses due to canceled flights and operational chaos. The scale of disruption underscores a fundamental truth: automation amplifies both benefits and failures.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;h2 style="line-height: 20px;"&gt;&lt;strong&gt;&lt;font face="Verdana, sans-serif" color="#057091" style="font-size: 17px;"&gt;The Illusion of Infallible Automation&lt;/font&gt;&lt;/strong&gt;&lt;/h2&gt;

    &lt;p&gt;&lt;font color="#2C3333"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 15px;"&gt;Automation is often sold as a panacea. It promises faster releases, fewer human errors, and continuous delivery at scale. But experts have noted that automated validation systems are still software, and therefore still prone to defects. As one analysis observed after the outage, automation tools can miss edge cases or malformed data exactly because they operate within predefined assumptions.&lt;br&gt;
    &lt;br&gt;&lt;/font&gt;&lt;font face="Verdana, sans-serif" style="font-size: 15px;"&gt;In the 2024 incident, the content validator allowed a defective configuration file to pass through because its own logic failed to spot the mismatch. This gap illustrates an important point: automation inherits the limitations and blind spots of its creators and its design. No matter how sophisticated, automated testing can only check for what it’s designed to anticipate.&lt;br&gt;&lt;/font&gt;&lt;font face="Verdana, sans-serif" style="font-size: 15px;"&gt;Equally consequential is the practice of deploying updates globally without staged rollouts or “canary” testing that limits blast radius. Had the faulty update been deployed to a small subset first, the outage might have been contained before it became global.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;h2 style="line-height: 20px;"&gt;&lt;strong&gt;&lt;font face="Verdana, sans-serif" color="#057091" style="font-size: 17px;"&gt;Accountability in a Fragmented Risk Landscape&lt;/font&gt;&lt;/strong&gt;&lt;/h2&gt;

    &lt;p&gt;&lt;font face="Verdana, sans-serif" color="#2C3333" style="font-size: 15px;"&gt;Traditionally, software vendors deliver products with liability clauses that limit financial exposure. Customers bear much of the operational risk when something goes wrong. This model assumes vendors won’t be at fault too often, and that organizations will manage their own risk through internal controls, testing environments, and contingency planning.&lt;/font&gt;&lt;/p&gt;

    &lt;p&gt;&lt;font face="Cambria, serif" color="#2C3333" style="font-size: 15px;"&gt;&lt;font face="Verdana, sans-serif" style=""&gt;As dependency on third&lt;/font&gt;&lt;font face="Cambria Math, serif" style=""&gt;‑&lt;/font&gt;&lt;font face="Verdana, sans-serif" style=""&gt;party tools increases across businesses, the lines of accountability grow blurrier, and ecosystem risk grows.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;h2 style="line-height: 20px;"&gt;&lt;strong&gt;&lt;font face="Verdana, sans-serif" color="#057091" style="font-size: 17px;"&gt;From Insurance to Guarantees: Shifting Risk Transfer Models&lt;/font&gt;&lt;/strong&gt;&lt;/h2&gt;

    &lt;p&gt;&lt;font face="Verdana, sans-serif" color="#2C3333" style="font-size: 15px;"&gt;One emerging response in the cybersecurity ecosystem is the integration of financial risk transfer mechanisms alongside technical tools. Traditional cyber insurance policies have long been used to shift risk—covering costs associated with breaches, ransomware attacks, and business interruptions. These operate reactively and often exclude systemic or vendor-related failures.&lt;br&gt;
    &lt;br&gt;&lt;/font&gt;&lt;font face="Verdana, sans-serif" color="#2C3333" style="font-size: 15px;"&gt;In contrast, some companies have begun offering guarantees or warranties backed by insurance that tie performance outcomes to financial protection. For example, one deep learning-based cybersecurity provider teamed with an insurer to offer a performance guarantee with ransomware warranty coverage up to millions of dollars—signaling confidence in both product effectiveness and risk mitigation.&lt;br&gt;
    &lt;br&gt;&lt;/font&gt;&lt;font face="Verdana, sans-serif" color="#2C3333" style="font-size: 15px;"&gt;Similarly, cyber warranty programs embedded with solutions now exist where customers receive financial backstop in the event of qualifying incidents. This helps to cover forensic costs, legal fees, or response activities.&lt;br&gt;
    &lt;br&gt;&lt;/font&gt;&lt;font face="Verdana, sans-serif" color="#2C3333" style="font-size: 15px;"&gt;These approaches represent a shift from purely technical performance to outcome-based assurances, essentially placing some level of financial accountability on the provider when specific guarantees aren’t met.&lt;/font&gt;&lt;/p&gt;

    &lt;h2 style="line-height: 20px;"&gt;&lt;strong&gt;&lt;font color="#4F81BD" face="Calibri, sans-serif" style="font-size: 17px;"&gt;&lt;strong&gt;&lt;font face="Verdana, sans-serif"&gt;Why This Matters Now&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/strong&gt;&lt;/h2&gt;

    &lt;p&gt;&lt;font face="Times New Roman, serif" style="font-size: 16px;" color="#2C3333"&gt;&lt;font face="Verdana, sans-serif" style=""&gt;The cyber insurance market itself reflects a changing risk calculus.&lt;/font&gt; &lt;a href="https://www.insurancebusinessmag.com/us/news/cyber/cyber-sees-stable-rates-tighter-vendor-risk-controls--rps-528447.aspx?utm_source=chatgpt.com" style=""&gt;&lt;font face="Verdana, sans-serif" style=""&gt;&lt;font style=""&gt;Claims have surged&lt;/font&gt;&lt;/font&gt;&lt;/a&gt;&lt;font face="Verdana, sans-serif" style=""&gt;, particularly around ransomware and third-party failures, pushing insurers to tighten underwriting and scrutinize vendor risk more closely. In some cases, insurers now demand continuous monitoring and proactive threat mitigation as prerequisites for coverage.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;p&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;" color="#2C3333"&gt;Meanwhile, hybrid models that blend warranty and insurance help bridge gaps between technical defense tools and financial resilience. They push organizations—and the vendors they work with—to think beyond feature checklists toward &lt;strong style=""&gt;shared accountability for outcomes&lt;/strong&gt;&lt;strong style=""&gt;.&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;h2 style="line-height: 20px;"&gt;&lt;strong&gt;&lt;font face="Verdana, sans-serif" color="#057091" style="font-size: 17px;"&gt;A Framework for Shared Accountability&lt;/font&gt;&lt;/strong&gt;&lt;/h2&gt;

    &lt;p&gt;&lt;font face="Verdana, sans-serif" color="#2C3333" style="font-size: 15px;"&gt;As digital systems continue to grow in complexity and interdependence, organizations need a framework that acknowledges both technical and financial aspects of risk.&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;font color="#2C3333"&gt;•&lt;font face="Times New Roman" style="font-size: 9px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; &lt;font face="Verdana, sans-serif" style="font-size: 15px;"&gt;More granular vendor commitments increase trust in product performance.&lt;br&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

  &lt;p&gt;&lt;font color="#2C3333" style="font-size: 15px;"&gt;•&lt;font face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; &lt;font face="Verdana, sans-serif"&gt;Integrated risk transfer ensures incidents don’t derail business continuity.&lt;br&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

  &lt;p&gt;&lt;font color="#2C3333" style="font-size: 15px;"&gt;•&lt;font face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; &lt;font face="Verdana, sans-serif"&gt;Retaining human oversight ensures automation enhances judgment.&lt;br&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

  &lt;p&gt;&lt;font color="#2C3333" style="font-size: 15px;"&gt;•&lt;font face="Times New Roman" style=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; &lt;font face="Verdana, sans-serif" style=""&gt;Continuous feedback turns failures into systemic improvement.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
&lt;/blockquote&gt;&lt;strong style="font-family: Rubik, sans-serif; font-size: 24px;"&gt;&lt;font face="Verdana, sans-serif" color="#057091" style="font-size: 17px;"&gt;Bridging Promise and Trust&lt;/font&gt;&lt;/strong&gt;&lt;br&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" color="#2C3333" style="font-size: 15px;"&gt;Automation and AI have immense potential to drive efficiency and scale, but their unchecked use can mask latent risks. As the industry evolves, true accountability will come from aligning technical performance with shared financial responsibility and risk management frameworks.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" color="#2C3333" style="font-size: 15px;"&gt;Closing the accountability gap isn’t about eliminating automation. It’s about designing systems, contracts, and risk policies that recognize the shared stakes of all parties involved—vendors, customers, insurers, and regulators alike.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana, sans-serif" color="#2C3333" style="font-size: 12px;"&gt;About the Author:&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Cambria, serif"&gt;&lt;font face="Verdana, sans-serif" color="#2C3333" style="font-size: 12px;"&gt;&lt;a href="https://www.linkedin.com/in/michael-benzinger-7198564/"&gt;&lt;font&gt;Michael Benzinger&lt;/font&gt;&lt;/a&gt;, Vice President, Director of Engineering for Cardre Information Security.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font&gt;&lt;font color="#2C3333" style="font-size: 12px;"&gt;&lt;sup style=""&gt;&lt;font face="Cambria, serif"&gt;[1]&lt;/font&gt;&lt;/sup&gt; &lt;font face="Cambria, serif"&gt;https://futurumgroup.com/press-release/ai-reaches-97-of-software-development-organizations/?utm_source=chatgpt.com&lt;/font&gt;&lt;/font&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13603642</link>
      <guid>https://www.technologyfirst.org/Tech-News/13603642</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Thu, 26 Feb 2026 20:42:15 GMT</pubDate>
      <title>Resilience in Manufacturing: How Octoplant Helps You Recover Faster and Operate Smarter</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/2026/Mike%20Rolfes%20March%202026.png" alt="" title="" border="0"&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 15px;"&gt;Manufacturing environments are becoming more automated, more connected, and more complex than ever before. While this progress unlocks efficiency and productivity, it also introduces new vulnerabilities. When something goes wrong on the plant floor, the speed at which you recover can mean the difference between a minor disruption and a costly production shutdown.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 15px;"&gt;&lt;strong&gt;&lt;font face="Verdana" color="#057091" style="font-size: 19px;"&gt;Common Problems That Disrupt Production&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 15px;"&gt;&lt;strong&gt;1. Downtime caused by missing or outdated program backups&lt;/strong&gt;&lt;br&gt;
A machine goes down unexpectedly. The maintenance team investigates and discovers the PLC program has been modified at some point—but no one knows when, why, or by whom. Worse, the only backup available is months old or incomplete. Production stops while engineers scramble to rebuild or recover the correct version. What should have been a quick fix turns into hours—or even days—of lost output.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 15px;"&gt;&lt;strong&gt;2. Untracked PLC or robot changes&lt;/strong&gt;&lt;br&gt;
On a busy shop floor, multiple technicians, engineers, and contractors may access control systems. Without a centralized way to track changes, small adjustments can create big problems. A line that ran perfectly yesterday suddenly behaves unpredictably today. Without an audit trail, troubleshooting becomes guesswork.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 15px;"&gt;&lt;strong&gt;3. Audit and compliance challenges&lt;/strong&gt;&lt;br&gt;
Whether driven by internal standards, customer requirements, or regulatory bodies, many manufacturers must demonstrate control over their automation assets. When documentation is scattered across personal laptops, USB drives, or outdated servers, preparing for an audit becomes stressful, time-consuming, and risky.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 15px;"&gt;&lt;strong&gt;4. Knowledge loss due to employee turnover&lt;/strong&gt;&lt;br&gt;
Experienced technicians often carry critical knowledge about machine configurations and program changes. When they leave, retire, or change roles, that knowledge can disappear with them. The next time an issue occurs, teams may struggle to understand how systems were configured or why certain changes were made.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 15px;"&gt;These scenarios are more common than many organizations would like to admit. The good news is that they are also preventable.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 15px;"&gt;&lt;strong&gt;&lt;font face="Verdana" color="#057091" style="font-size: 19px;"&gt;Building Resilience with Octoplant&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 15px;"&gt;Resilient manufacturing operations are not just about preventing downtime—they are about recovering quickly and confidently when issues occur. This is where Octoplant plays a critical role.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 15px;"&gt;Octoplant is designed to centralize, secure, and manage automation assets across the entire plant. Instead of relying on scattered backups and manual documentation, manufacturers gain a single source of truth for their control programs and configurations.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 15px;"&gt;Here’s how Octoplant helps companies improve resilience and reduce time to recovery.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 15px;"&gt;&lt;strong&gt;1. Automated, reliable backups&lt;/strong&gt;&lt;br&gt;
Octoplant performs regularly scheduled backups of PLCs, robots, HMIs, and other automation devices. This ensures that the most recent, validated version of each program is always available. When a failure occurs, maintenance teams can quickly restore the correct version—eliminating guesswork and reducing downtime.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 15px;"&gt;&lt;strong&gt;2. Full change tracking and audit trails&lt;/strong&gt;&lt;br&gt;
Every change to a control program is tracked. Teams can see who made the change, when it happened, and what was modified. This visibility simplifies troubleshooting and ensures accountability across the organization.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 15px;"&gt;&lt;strong&gt;3. Centralized version control&lt;/strong&gt;&lt;br&gt;
With Octoplant, all automation programs are stored in a centralized, structured repository. Instead of searching through multiple laptops or network folders, engineers can instantly access the latest approved version. This reduces the risk of loading outdated or incorrect programs during recovery.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 15px;"&gt;&lt;strong&gt;4. Faster troubleshooting and recovery&lt;/strong&gt;&lt;br&gt;
When something goes wrong, time is critical. Octoplant provides immediate insight into program differences, recent changes, and system status. Maintenance teams can quickly identify the root cause and restore operations—often in minutes instead of hours.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 15px;"&gt;&lt;strong&gt;5. Knowledge retention across the workforce&lt;/strong&gt;&lt;br&gt;
By documenting changes and storing programs centrally, Octoplant captures institutional knowledge. Even when employees leave or retire, the system retains the history and context needed to keep operations running smoothly.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 15px;"&gt;&lt;strong&gt;&lt;font face="Verdana" color="#057091" style="font-size: 19px;"&gt;From Reactive to Resilient&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 16px;"&gt;In modern manufacturing, disruptions are inevitable. Equipment fails, changes are made, and people come and go. The difference between a fragile operation and a resilient one lies in preparation, visibility, and control.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 16px;"&gt;Octoplant gives manufacturers the tools they need to move from reactive troubleshooting to proactive resilience. By ensuring that every automation asset is backed up, tracked, and recoverable, companies can protect production, reduce risk, and maintain confidence in their operations.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 16px;"&gt;When downtime strikes, resilience isn’t just about getting back online—it’s about how fast and how confidently you can do it. With Octoplant, recovery becomes a controlled, predictable process.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 11px;"&gt;&lt;strong&gt;About the author:&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 12px;"&gt;Mike Rolfes is an account manager at ATR Automation.&amp;nbsp; ATR Automation has been providing industrial automation and electrical engineering solutions since 1956.&amp;nbsp; As we have grown with the development of our community over the last 60 years, we have become the trusted name for industrial automation software in the region.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font style="font-size: 12px;"&gt;&lt;font face="Verdana" color="#2C3333" style=""&gt;To learn more about Octoplant, please reach out to ATR Automation.&amp;nbsp; I can be reached at&lt;/font&gt; &lt;font color="#000000" face="Verdana" style=""&gt;&lt;a href="mailto:michaelrolfes@atrautomation.com"&gt;&lt;font color="#0563C1"&gt;michaelrolfes@atrautomation.com&lt;/font&gt;&lt;/a&gt;&lt;/font&gt; &lt;font face="Verdana" color="#2C3333" style=""&gt;or (513) 353-1800 ext. 5037.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13602773</link>
      <guid>https://www.technologyfirst.org/Tech-News/13602773</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Mon, 26 Jan 2026 20:49:37 GMT</pubDate>
      <title>Modern Identity Security: What Actually Stops Attacks</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/2026/Chiam%20Black%20-%20February%202026.png" alt="" title="" border="0"&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 16px;"&gt;As organizations rapidly move applications and data to cloud platforms, cloud identity providers have replaced the network perimeter as the primary security boundary. Compromising a single account can provide broad access, making identity one of the highest-value targets for attackers.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 16px;"&gt;Multi-factor authentication (MFA) was once the most effective defense against account takeover. Today, it remains necessary—but it is no longer sufficient without additional steps.&lt;/font&gt;&lt;/p&gt;

&lt;h2 style="line-height: 25px;"&gt;&lt;font color="#0F4761" face="Verdana" style="font-size: 18px;"&gt;&lt;strong&gt;What MFA Was Built to Prevent&lt;/strong&gt;&lt;/font&gt;&lt;/h2&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 16px;"&gt;Traditional phishing attacks focused on stealing credentials. Users were tricked into entering a username and password into a fake website, which attackers then reused to log in to the real service.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 16px;"&gt;MFA disrupted this model. Even with stolen credentials, attackers could not complete authentication without access to the second factor. For years, this significantly reduced phishing-related compromises.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 16px;"&gt;That protection assumed attackers were outside the authen&lt;/font&gt;&lt;font color="#000000" face="Verdana" style="font-size: 16px;"&gt;tication flow. Modern attacks no longer operate under that assumption.&lt;/font&gt;&lt;/p&gt;

&lt;h2 style="line-height: 25px;"&gt;&lt;font color="#0F4761" face="Verdana" style="font-size: 18px;"&gt;&lt;strong&gt;How Adversary-in-the-Middle Attacks Bypass MFA&lt;/strong&gt;&lt;/font&gt;&lt;/h2&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 16px;"&gt;Adversary-in-the-Middle (AiTM) phishing shifts the attack from credential theft to session theft.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 16px;"&gt;Instead of sending users to a fake login page, attackers proxy the real sign-in experience. The victim authenticates to the legitimate service and completes MFA normally. Behind the scenes, the attacker relays all traffic and captures the resulting session token.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 16px;"&gt;Session tokens prove that authentication has already occurred. Once issued, they allow access without requiring the password or MFA again. If an attacker steals the token, MFA is effectively bypassed.&lt;/font&gt;&lt;/p&gt;

&lt;h2 style="line-height: 25px;"&gt;&lt;font color="#0F4761" face="Verdana" style="font-size: 18px;"&gt;&lt;strong&gt;A&lt;/strong&gt;&lt;/font&gt; &lt;font color="#0F4761" face="Verdana" style="font-size: 18px;"&gt;&lt;strong&gt;Typical AiTM Attack Flow&lt;/strong&gt;&lt;/font&gt;&lt;/h2&gt;

&lt;ol&gt;
  &lt;li style="line-height: 18px;"&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 16px;"&gt;The user receives a phishing email designed to create urgency.&lt;/font&gt;&lt;/li&gt;

  &lt;li style="line-height: 18px;"&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 16px;"&gt;Clicking the link routes the user through attacker-controlled infrastructure.&lt;/font&gt;&lt;/li&gt;

  &lt;li style="line-height: 18px;"&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 16px;"&gt;The attacker proxies the real login service.&lt;/font&gt;&lt;/li&gt;

  &lt;li style="line-height: 18px;"&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 16px;"&gt;The user enters credentials and completes MFA.&lt;/font&gt;&lt;/li&gt;

  &lt;li style="line-height: 18px;"&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 16px;"&gt;The identity provider issues a session token.&lt;/font&gt;&lt;/li&gt;

  &lt;li style="line-height: 18px;"&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 16px;"&gt;The attacker captures and replays the token to access the account.&lt;/font&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 16px;"&gt;From the identity provider’s perspective, the attacker’s session is valid. Authentication already succeeded.&lt;/font&gt;&lt;/p&gt;

&lt;h2 style="line-height: 25px;"&gt;&lt;font color="#0F4761" face="Verdana" style="font-size: 18px;"&gt;&lt;strong&gt;Why Traditional MFA Falls Short&lt;/strong&gt;&lt;/font&gt;&lt;/h2&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 16px;"&gt;Most MFA methods—SMS codes, authenticator apps, and push approvals—can be relayed in real time. AiTM attacks exploit this by forwarding challenges and responses between the victim and the real service.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 16px;"&gt;Because the session token is issued &lt;em style=""&gt;after&lt;/em&gt; MFA is completed, MFA alone does not prevent token theft or reuse. Defending against AiTM requires controls that either prevent token capture or limit token usability.&lt;/font&gt;&lt;/p&gt;

&lt;h2 style="line-height: 25px;"&gt;&lt;font color="#0F4761" face="Verdana" style="font-size: 18px;"&gt;&lt;strong&gt;Controls That Actually Reduce Risk&lt;/strong&gt;&lt;/font&gt;&lt;/h2&gt;

&lt;p&gt;&lt;font color="#0F4761" face="Verdana" style="font-size: 16px;"&gt;P&lt;/font&gt;&lt;font color="#0F4761" face="Verdana" style="font-size: 16px;"&gt;hish-Resistant Authentication&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 16px;"&gt;FIDO2 security keys, passkeys, and certificate-based authentication are resistant to relay attacks. These methods cryptographically bind authentication to the legitimate service and cannot be replayed through a proxy.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;&lt;font color="#0F4761" style="color: rgb(0, 0, 0);"&gt;Device-Based Access Controls&lt;/font&gt;&lt;br&gt;
&lt;font color="#2C3333"&gt;Requiring trusted devices adds a second enforcement layer. During the login process, the identity provider does an additional check to validate it is a trusted device and not an attacker’s proxy server.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;&lt;font color="#0F4761" style="color: rgb(0, 0, 0);"&gt;Session Token Protection&lt;/font&gt;&lt;br&gt;
&lt;font color="#2C3333"&gt;Short session lifetimes, token binding, and continuous access evaluation reduce the value of stolen tokens and limit attacker dwell time.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;&lt;font color="#0F4761" style="color: rgb(0, 0, 0);"&gt;Continuous Detection&lt;/font&gt;&lt;br&gt;
&lt;font color="#2C3333"&gt;Identity Threat Detection and Response (ITDR) tools identify anomalous behavior such as unfamiliar devices or impossible travel, enabling rapid containment when prevention fails.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;h2 style="line-height: 25px;"&gt;&lt;font color="#0F4761" face="Verdana" style="font-size: 18px;"&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;/font&gt;&lt;/h2&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 16px;"&gt;MFA is no longer a complete defense against modern identity attacks. Adversary-in-the-Middle demonstrates that attackers can bypass authentication by stealing sessions instead of credentials.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 16px;"&gt;Effective identity security requires layered controls that reflect how attacks occur: phish-resistant authentication, device trust, hardened sessions, and continuous monitoring.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 16px;"&gt;Identity is now the perimeter. Defending it requires more than a second factor.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 12px;"&gt;About the Author&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" style="font-size: 12px;"&gt;&lt;a href="https://www.linkedin.com/in/chaim-black/" target="_blank" style=""&gt;&lt;font color="#057091"&gt;Chaim Black&lt;/font&gt;&lt;/a&gt; &lt;font&gt;&lt;font color="#2C3333"&gt;is a Cyber Security Manager at&lt;/font&gt; &lt;a href="https://www.intrust-it.com/" target="_blank" style=""&gt;&lt;font color="#057091"&gt;Intrust IT.&lt;/font&gt;&lt;/a&gt; &lt;font color="#2C3333"&gt;He is focused on delivering resilient security operations. He leads day-to-day security team execution while strengthening internal security posture and compliance. Chaim also serves as President of InfraGard Cincinnati, part of the FBI-private sector partnership advancing information sharing and cyber risk awareness.&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13589586</link>
      <guid>https://www.technologyfirst.org/Tech-News/13589586</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Mon, 26 Jan 2026 20:16:20 GMT</pubDate>
      <title>Signature-Based Detection Is Losing the Arms Race, And AI Is Accelerating the Problem</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/2026/Anthony%20Cihan%20-%20February%202026.png" alt="" title="" border="0"&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 16px;"&gt;The shift in offensive operations over the last 18 months is unlike anything the industry has seen before. AI isn't coming for defenders, it's already here. And to make things worse, attackers are using it to outpace traditional security controls at a rate that should concern everyone.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 16px;"&gt;Here's the reality: signature-based detection was always playing catch-up. It works by recognizing things that have already been seen; file hashes, known-bad strings, IOCs pulled from last month's incident. That model assumes attackers are reusing tools and infrastructure. They're not. Not anymore.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" color="#057091" style="font-size: 16px;"&gt;&lt;strong&gt;Polymorphism at Scale&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 16px;"&gt;Polymorphic malware isn't new. What's new is how trivially easy AI makes it to generate variants. A red team operator can take a loader, feed it through an LLM-assisted obfuscation pipeline, and produce hundreds of unique builds that share zero static indicators. Different hashes, different string tables, different control flow. Same capability.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 16px;"&gt;From an offensive perspective, this changes engagement dynamics completely. Payload development and evasion used to consume significant amounts of time. Now, generating AV-bypassing variants is almost a commodity task. If authorized red teams can do it with limited resources, assume actual threat actors, with more time, more money, and no rules of engagement, are doing it better.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 16px;"&gt;The tooling exists to test payloads against defender solutions in automated loops. Spin up a sandbox, drop the payload, check detection, mutate, repeat. Iterate until clean. That's not theoretical, it's how modern offensive tooling development works.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" color="#057091" style="font-size: 16px;"&gt;&lt;strong&gt;Why Behavioral Detection Has to Be the Focus&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 16px;"&gt;If static indicators are unreliable, what's left? Behavior.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 16px;"&gt;Malware can change its code, but it still must &lt;em&gt;do&lt;/em&gt; something. It needs to establish persistence, move laterally, touch credentials, call home. Those actions leave traces that are harder to obfuscate than a file hash.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 16px;"&gt;Competent defenders should be watching for:&lt;/font&gt;&lt;/p&gt;

&lt;div style="margin-left: 2em"&gt;
  &lt;ul&gt;
    &lt;li style="line-height: 18px;"&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 16px;"&gt;Process lineage that doesn't make sense (Word spawning PowerShell spawning cmd.exe)&lt;/font&gt;&lt;/li&gt;

    &lt;li style="line-height: 18px;"&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 16px;"&gt;Authentication patterns that deviate from baseline (service accounts logging in interactively, lateral movement spikes)&lt;/font&gt;&lt;/li&gt;

    &lt;li style="line-height: 18px;"&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 16px;"&gt;Memory behaviors associated with injection techniques&lt;/font&gt;&lt;/li&gt;

    &lt;li style="line-height: 18px;"&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 16px;"&gt;Network traffic that violates expected protocol norms&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 16px;"&gt;Good detection engineering focuses on these patterns, not on "did we see this exact hash before." The best blue teams aren't hunting for tools, they're hunting for &lt;em&gt;tradecraft&lt;/em&gt;.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" color="#057091" style="font-size: 16px;"&gt;&lt;strong&gt;IOCs Need to Get Smarter&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 16px;"&gt;Most IOC feeds are noise. A hash gets burned within hours. A C2 domain is useful until the next rotation. If a detection strategy depends on someone else seeing the attack first and publishing indicators, it's always behind.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 16px;"&gt;The IOCs worth investing in are behavioral: specific API call sequences, registry key patterns associated with persistence mechanisms, authentication anomalies, protocol misuse. These tie to &lt;em&gt;what the attacker is trying to accomplish&lt;/em&gt;, not &lt;em&gt;what tool they happen to be using today&lt;/em&gt;. That's the important distinction.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 16px;"&gt;Anyone building custom offensive tooling knows that changing source code is easy. Changing objectives is not. Credential access is still required. Lateral movement is still required. Exfiltration is still required. Detect those actions, and the operator gets caught regardless of what the payload looks like.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" color="#057091" style="font-size: 16px;"&gt;&lt;strong&gt;AI Works Both Ways&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 16px;"&gt;Defenders have access to the same technology. Machine learning models that baseline normal environment behavior and flag deviations are genuinely useful when tuned properly and fed good telemetry. The challenge is operationalizing them without drowning in false positives.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 16px;"&gt;The environments that cause the most problems during offensive engagements are the ones with mature detection engineering programs. They're correlating endpoint telemetry with identity logs and network traffic in near real-time. They're running adversary simulations that mirror actual attacker behavior, not checkbox compliance exercises. They're hunting proactively instead of waiting for alerts.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" color="#057091" style="font-size: 16px;"&gt;&lt;strong&gt;The Uncomfortable Truth&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 16px;"&gt;Prevention won't stop every breach. That's not defeatism, it's operational reality. Attackers only need to be right once. Defenders need to be right constantly.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 16px;"&gt;The goal isn't perfection. The goal is making attacker operations expensive, noisy, and slow enough that detection happens before objectives are achieved. That means investing in detection engineering, building response capabilities that actually work under pressure, and accepting that security stacks will fail at some point.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" color="#2C3333" style="font-size: 16px;"&gt;AI is making attacks cheaper and faster to produce. The response isn't more signatures; it's better detection of the behaviors that signatures can't catch.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font color="#000000" face="Aptos, sans-serif" style="font-size: 14px;"&gt;&lt;strong style=""&gt;Author:&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;&lt;font style="font-size: 14px;" face="Verdana"&gt;&lt;a href="ttps://www.linkedin.com/in/anthony-cihan-5a4a039b/" target="_blank" style=""&gt;&lt;font style="" color="#057091"&gt;Anthony Cihan&lt;/font&gt;&lt;/a&gt; &lt;font style=""&gt;&lt;font color="#2C3333"&gt;is the Senior Principal Cybersecurity Engineer at&lt;/font&gt; &lt;a href="https://obviam.com/" target="_blank" style=""&gt;&lt;font color="#057091"&gt;Obviam&lt;/font&gt;&lt;/a&gt; &lt;font color="#2C3333"&gt;where he leads offensive security operations and security assessments. He holds a BS is Cybersecurity and Information Assurance, the OSCP and OSWP, and has published multiple offensive security tools such as the PiSquirrel wiretap/implant and the Spellbinder SLAAC based IPv6 attack tool.&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13589574</link>
      <guid>https://www.technologyfirst.org/Tech-News/13589574</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Tue, 23 Dec 2025 15:24:05 GMT</pubDate>
      <title>The 2026 Tech Leader Playbook: Top 5 Priorities for the Next Wave</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/2026/Parag%20Pujari%20-%20January%202026.png" alt="" title="" border="0"&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" style="font-size: 16px;" color="#2C3333"&gt;The technology landscape is shifting at an unprecedented pace, driven primarily by the rapid maturity of Artificial Intelligence. For tech leaders—CIOs, CTOs, and CISOs—2026 isn't just another year; it's a pivotal moment to move from experimentation to enterprise-grade execution. Success will be defined not by the technology you adopt, but by how strategically and responsibly you embed it at the core of your business.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" style="font-size: 16px;" color="#2C3333"&gt;Here are my top five priorities that will define the winners in 2026 and beyond.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font style="font-size: 16px;"&gt;&lt;strong&gt;&lt;font face="Verdana" color="#01507A"&gt;1. Establish Comprehensive AI Governance and Ethics&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" style="font-size: 16px;" color="#2C3333"&gt;AI is no longer a fringe tool; it's becoming the operational fabric of the enterprise. This widespread adoption, especially of Generative AI and autonomous agents, elevates the need for robust governance.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" style="font-size: 16px;" color="#2C3333"&gt;Leaders must prioritize building a comprehensive AI governance framework that moves from policy to operation. This framework is essential for managing risk, ensuring compliance, and building customer trust. Key actions include:&lt;/font&gt;&lt;/p&gt;

&lt;div style="margin-left: 2em"&gt;
  &lt;ul&gt;
    &lt;li&gt;&lt;font face="Verdana" style="font-size: 16px;" color="#2C3333"&gt;&lt;strong&gt;&lt;font&gt;Define Responsible Use:&lt;/font&gt;&lt;/strong&gt; &lt;font&gt;Implement clear, regularly updated policies for how employees can and cannot use AI tools, with a focus on data privacy and intellectual property.&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Verdana" style="font-size: 16px;" color="#2C3333"&gt;&lt;strong&gt;&lt;font&gt;Ensure Data Provenance:&lt;/font&gt;&lt;/strong&gt; &lt;font&gt;As AI models rely on vast datasets, establishing digital provenance&lt;strong&gt;,&lt;/strong&gt; proving that your data and AI outputs are genuine, traceable, and compliant is critical.&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Verdana" style="font-size: 16px;" color="#2C3333"&gt;&lt;strong&gt;&lt;font&gt;Build-in Transparency:&lt;/font&gt;&lt;/strong&gt; &lt;font&gt;Design AI agents that can document and explain their decisions, allowing for essential "human-in-the-loop" review and accountability, especially in high-risk applications like hiring or customer service.&lt;/font&gt;&lt;/font&gt;&lt;strong style="font-size: 16px;"&gt;&lt;font face="Verdana" color="#2C3333"&gt;&amp;nbsp;&lt;/font&gt;&lt;/strong&gt;&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font style="font-size: 16px;"&gt;&lt;strong&gt;&lt;font face="Verdana" color="#01507A"&gt;2. Modernize Infrastructure for an AI-Native Future&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" style="font-size: 16px;" color="#2C3333"&gt;The existing IT infrastructure, often burdened by years of &lt;strong&gt;technical debt&lt;/strong&gt;, cannot support the demands of AI on a scale. AI models require massive compute power, high-speed data pipelines, and a flexible, low-latency environment.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" style="font-size: 16px;" color="#2C3333"&gt;A core priority for 2026 must be the modernization of systems and the transition to an AI-native platform. This means:&lt;/font&gt;&lt;/p&gt;

&lt;div style="margin-left: 2em"&gt;
  &lt;ul&gt;
    &lt;li&gt;&lt;font face="Verdana" style="font-size: 16px;" color="#2C3333"&gt;&lt;strong&gt;&lt;font&gt;Cloud Foundation:&lt;/font&gt;&lt;/strong&gt; &lt;font&gt;Doubling down on a full-stack, cloud-first approach that provides the necessary scalability, agility, and specialized AI supercomputing platforms.&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Verdana" style="font-size: 16px;" color="#2C3333"&gt;&lt;strong&gt;&lt;font&gt;Data Readiness:&lt;/font&gt;&lt;/strong&gt; &lt;font&gt;Creating a robust "data factory" with strong data governance to ensure the quality, security, and interoperability of the data that feeds your AI models.&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Verdana" style="font-size: 16px;" color="#2C3333"&gt;&lt;strong&gt;&lt;font&gt;Edge Computing:&lt;/font&gt;&lt;/strong&gt; &lt;font&gt;Leveraging edge computing capabilities, often via IoT, to process AI-driven data closer to where it's generated (e.g., manufacturing floors, smart cities) for real-time decision-making.&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font style="font-size: 16px;"&gt;&lt;strong&gt;&lt;font face="Verdana" color="#2C3333"&gt;3. Elevate Cybersecurity to Preemptive Resilience&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" style="font-size: 16px;" color="#2C3333"&gt;With AI-powered attacks becoming faster and more sophisticated, standard perimeter defense is insufficient. Cybersecurity is no longer an IT operational task; it's a board-level risk concern.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" style="font-size: 16px;" color="#2C3333"&gt;Tech leaders must shift their focus to preemptive cybersecurity and a culture of resilience:&lt;/font&gt;&lt;/p&gt;

&lt;div style="margin-left: 2em"&gt;
  &lt;ul&gt;
    &lt;li&gt;&lt;font face="Verdana" style="font-size: 16px;" color="#2C3333"&gt;&lt;strong&gt;&lt;font&gt;Zero-Trust Security:&lt;/font&gt;&lt;/strong&gt; &lt;font&gt;Fully implementing a zero-trust model across the organization, which assumes no user or device is trusted by default, minimizing the risk of internal breaches.&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Verdana" style="font-size: 16px;" color="#2C3333"&gt;&lt;strong&gt;&lt;font&gt;AI-Driven Defense:&lt;/font&gt;&lt;/strong&gt; &lt;font&gt;Utilizing AI security platforms for proactive threat detection, anomaly scoring, and automated incident response to combat AI-enhanced reconnaissance and supply-chain attacks.&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Verdana" style="font-size: 16px;" color="#2C3333"&gt;&lt;strong&gt;&lt;font&gt;Upskill Every Employee:&lt;/font&gt;&lt;/strong&gt; &lt;font&gt;Cybersecurity remains a human problem. Prioritize company-wide, continuous training that focuses on phishing, identity management, and the risks associated with deepfakes and synthetic content.&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font style="font-size: 16px;"&gt;&lt;strong&gt;&lt;font face="Verdana" color="#01507A"&gt;4. Redesign the Workforce for Human-AI Collaboration&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" style="font-size: 16px;" color="#2C3333"&gt;The conversation around AI is shifting from job displacement to workforce transformation. Successful leaders will recognize that the competitive advantage lies in creating human-AI hybrid teams.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" style="font-size: 16px;" color="#2C3333"&gt;The priority here is to cultivate the human skills that AI cannot replace and redefine roles for the new era:&lt;/font&gt;&lt;/p&gt;

&lt;div style="margin-left: 2em"&gt;
  &lt;ul&gt;
    &lt;li&gt;&lt;font face="Verdana" style="font-size: 16px;" color="#2C3333"&gt;&lt;strong&gt;&lt;font&gt;Reskilling and Upskilling:&lt;/font&gt;&lt;/strong&gt; &lt;font&gt;Make continuous learning a strategic imperative, training employees in data fluency, AI implementation, and prompt engineering. The most valuable professionals will blend technical AI fluency with critical human skills like creativity, emotional intelligence, and long-term strategic thinking.&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Verdana" style="font-size: 16px;" color="#2C3333"&gt;&lt;strong&gt;&lt;font&gt;New Roles and Career Paths:&lt;/font&gt;&lt;/strong&gt; &lt;font&gt;Establish new career pathways for roles that manage, monitor, and design AI systems, such as AI Ethics Officers and Agent Orchestrators.&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Verdana" style="font-size: 16px;" color="#2C3333"&gt;&lt;strong&gt;&lt;font&gt;Focus on Human Judgment:&lt;/font&gt;&lt;/strong&gt; &lt;font&gt;Use AI to eliminate mundane tasks, freeing human workers to focus on high-value activities that require complex judgment, empathy, and strategic decision-making.&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font style="font-size: 16px;"&gt;&lt;strong&gt;&lt;font face="Verdana" color="#01507A"&gt;5. Drive the Shift to Composable and Adaptable Architectures&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" style="font-size: 16px;" color="#2C3333"&gt;In a world defined by rapid change and intense competition, the traditional, monolithic application structure is a liability. Large, interconnected systems are slow to update, difficult to integrate with emerging AI capabilities, and prevent the business from responding quickly to market demands.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" style="font-size: 16px;" color="#2C3333"&gt;Tech leaders must make the strategic priority a shift toward a composable enterprise built on modular, adaptable systems. This approach emphasizes flexibility, speed, and reuse:&lt;/font&gt;&lt;/p&gt;

&lt;div style="margin-left: 2em"&gt;
  &lt;ul&gt;
    &lt;li&gt;&lt;font face="Verdana" style="font-size: 16px;" color="#2C3333"&gt;&lt;strong&gt;&lt;font&gt;Adopt Modular Architectures:&lt;/font&gt;&lt;/strong&gt; &lt;font&gt;Prioritize the full transition to microservices, containerization, and API-first design. This allows developers to quickly assemble and disassemble business capabilities (e.g., payment processing, customer login) as market conditions or new AI tools require.&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Verdana" style="font-size: 16px;" color="#2C3333"&gt;&lt;strong&gt;&lt;font&gt;Invest in Integration Fabric:&lt;/font&gt;&lt;/strong&gt; &lt;font&gt;Deploy a modern, robust integration layer (like an event mesh or sophisticated API gateway) that allows data and services to flow seamlessly between core legacy systems, cloud-native applications, and third-party vendor platforms. This is the glue that enables true agility.&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Verdana" style="font-size: 16px;" color="#2C3333"&gt;&lt;strong&gt;&lt;font&gt;Empower Fusion Teams:&lt;/font&gt;&lt;/strong&gt; &lt;font&gt;Move away from siloed IT and business units. Establish cross-functional "fusion teams" that blend business experts with low-code/no-code developers. These teams can rapidly assemble existing components to create tailored applications without waiting for lengthy, centralized IT development cycles.&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Aptos, sans-serif"&gt;&lt;em style=""&gt;&lt;font face="Verdana, sans-serif" style="font-size: 14px;" color="#2C3333"&gt;About the Author&lt;/font&gt;&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Aptos, sans-serif" color="#2C3333"&gt;&lt;em style=""&gt;&lt;font face="Verdana, sans-serif" style="font-size: 14px;"&gt;Parag Pujari is the Chief Information Officer (CIO) of Jurgensen Companies, where he oversees all technologies, IT strategy, IT operations and drives digital transformation initiatives to enhance business performance and efficiency. Parag has a distinguished background in IT leadership, specializing in areas such as cloud computing, ERP, cybersecurity, and enterprise architecture. Parag is crucial in aligning Jurgensen Companies’ technologic&lt;/font&gt;&lt;font face="Verdana, sans-serif"&gt;&lt;font style="font-size: 14px;"&gt;al capabilities with its long-term strategic business goals.&lt;/font&gt;&lt;/font&gt;&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13575604</link>
      <guid>https://www.technologyfirst.org/Tech-News/13575604</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Tue, 23 Dec 2025 15:04:39 GMT</pubDate>
      <title>Red Flags in Professional Relationships: Lessons from Hiring Technology Leaders</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/2026/Aaron%20Davis%20-%20January%202026.png" alt="" title="" border="0"&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana, sans-serif" color="#2C3333" style="font-size: 16px;"&gt;I hire technology leaders for a living, so I do a lot of interviews. There are some attitudes that consistently raise red flags. These are behaviors to be cautious about in professional collaborations of any sort. Watch out for them when vetting vendors, negotiating partnerships, or considering a new job. And most importantly, avoid these behaviors yourself.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Arial, sans-serif" style="font-size: 15px;"&gt;&lt;strong style=""&gt;&lt;font face="Verdana, sans-serif" color="#01507A" style="font-size: 19px;"&gt;Speaking poorly of former colleagues, partners, or customers&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;" color="#2C3333"&gt;This is perhaps the most common and damaging one I encounter. When a candidate casually disparages a previous boss as "incompetent" or a former team as "lazy," it immediately sets off alarms. First, anyone who gossips will gossip about you. If they're willing to breach confidentiality or loyalty with past relationships, what's to stop them from doing the same when they move on from your organization?&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;" color="#2C3333"&gt;Trust is foundational in tech leadership—sharing sensitive strategies, handling team dynamics, or collaborating on high-stakes projects all require discretion. A level of confidentiality is assumed. We need to feel safe to be imperfect. In innovative environments, mistakes happen as part of experimentation. Badmouthing absent parties erodes psychological safety; it signals that errors will be weaponized rather than learned from.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font color="#2C3333"&gt;&lt;span style=""&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;Nobody can see the whole picture. Deference to the unknown is a sign of maturity. Perhaps the former colleague had unseen constraints—resource limitations, personal challenges, or higher-level directives. Mature professionals show humility by&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;span style=""&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;withholding judgment, opting instead for curiosity: "I wondered if there might have been factors I wasn't aware of."&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Arial, sans-serif" style="font-size: 15px;"&gt;&lt;strong style=""&gt;&lt;font face="Verdana, sans-serif" color="#01507A" style="font-size: 19px;"&gt;Blaming others for failures&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;" color="#2C3333"&gt;Flag number two is blaming. Externalizing failures when addressing a setback lacks nuance and appreciation of complexity. Tech ecosystems are intricate delays often stem from interdependent factors like ambiguous requirements, shifting priorities, or uncontrollable dependencies. Leaders who oversimplify by pointing fingers miss the systemic view needed for effective problem-solving.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;" color="#2C3333"&gt;Accountability is non-negotiable in leadership. Owning outcomes, even when not directly at fault, demonstrates integrity. Blamers often avoid reflection: "What could I have done differently to mitigate this?" Blame reveals a missed growth opportunity. Those who blame others stagnate, while reflective leaders evolve.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font color="#01507A"&gt;&lt;strong style="font-size: 15px; font-family: Arial, sans-serif;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 19px;"&gt;Casting a lost promotion or reduced scope as a betrayal&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;" color="#2C3333"&gt;This last one is a little more obscure, but I still hear it regularly. It emerges when discussing reasons for leaving a role. Candidates will frame being pushed to a smaller team, budget cuts, or shifted responsibilities as personal victimization—"They promised me X and then pulled the rug out."&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;" color="#2C3333"&gt;This kind of attitude reveals entitlement over adaptability. In dynamic tech landscapes, scopes evolve due to market shifts, funding rounds, or pivots. Resilient leaders view these as realities to navigate, not betrayals to resent. Even if it does hurt to be trusted with less responsibility, taking it as an attack reflects poor emotional regulation. Reacting with bitterness suggests difficulty handling ambiguity or disappointment gracefully—qualities essential for leading through uncertainty.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;" color="#2C3333"&gt;A victim mindset fosters resentment, reducing willingness to invest in the team's success when conditions aren't ideal.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;" color="#2C3333"&gt;These red flags aren't about perfection—no one has a flawless history. They're about patterns of immaturity: low self-control, ego-driven responses, and combativeness over curiosity. In contrast, professionals who earn trust speak with goodwill, own their part, appreciate complexity, and adapt without grievance.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;" color="#2C3333"&gt;As you build your network—whether hiring, partnering, or job-seeking—pay attention to these signals. They imply how someone handles conflict, uncertainty, and relationships. And that awareness cuts both ways: self-reflect to avoid exhibiting them yourself. Practice pausing before critiquing absent parties; frame past experiences with ownership and nuance; view changes as opportunities rather than injustices.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;" color="#2C3333"&gt;In leadership, especially technology, trust compounds success. Spot these flags early, in yourself and others, and steer toward collaborations that build it rather than erode it.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#2C3333"&gt;&lt;em&gt;&lt;span style="background-color: white;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 14px;"&gt;About the Author:&lt;/font&gt;&lt;/span&gt;&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#2C3333"&gt;&lt;em&gt;&lt;span style="background-color: white;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 14px;"&gt;Aaron Davis is a seasoned leader and talent acquisition expert. With a career spanning over two decades, Aaron has built and led successful teams across various industries, including tech staffing, software development, healthcare, &amp;amp; real estate investment. He founded Reliant Search Group in 2019 and still enjoys connecting business leaders with critical talent. Aaron&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;span style=""&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;hosts the "Being Built" podcast, where he shares insights on business growth and leadership.&lt;/font&gt;&lt;/span&gt;&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13575600</link>
      <guid>https://www.technologyfirst.org/Tech-News/13575600</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Fri, 28 Nov 2025 13:32:32 GMT</pubDate>
      <title>Five Cybersecurity Trends Every Leader Needs to Know for 2026</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/Mackenzie%20Cole%20Blog%20December%202025.png" alt="" title="" border="0"&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Cybersecurity in 2026 is at the center of digital transformation. AI-driven threats, expanding attack surfaces, and global regulatory shifts are rewriting the rules of risk management. Leaders who understand these dynamics will shape organizations that thrive in a world where security is inseparable from innovation. These five trends highlight the changes shaping cybersecurity and why acting today sets the stage for long-term growth.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Aptos, sans-serif"&gt;&lt;strong style=""&gt;&lt;font face="Verdana, sans-serif" color="#244667" style="font-size: 18px;"&gt;1. AI: The Double-Edged Sword&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font style="font-size: 16px;"&gt;&lt;font face="Verdana, sans-serif"&gt;Artificial intelligence has become a pivotal force in both offensive and defensive cybersecurity operations. Threat actors are increasingly leveraging generative AI to craft highly convincing phishing campaigns and other social engineering attacks at scale. &lt;strong style=""&gt;According to&lt;/strong&gt;&lt;/font&gt; &lt;a href="https://www.sentinelone.com/cybersecurity-101/cybersecurity/cyber-security-statistics/" target="_blank" style="color: rgb(0, 0, 0);"&gt;&lt;font face="Verdana, sans-serif"&gt;&lt;font color="#467886"&gt;&lt;strong&gt;SentinelOne’s 2025&lt;/strong&gt;&lt;/font&gt;&lt;/font&gt;&lt;/a&gt; &lt;font face="Verdana"&gt;&lt;strong style=""&gt;report, phishing attacks surged by 1,265% year-over-year, largely driven by the adoption of GenAI in attack workflows.&lt;/strong&gt; &lt;font style=""&gt;In response, defensive AI systems are employing behavioral analytics and predictive modeling to detect anomalies and mitigate threats in real time, aiming to counter the growing sophistication and volume of AI-enabled attacks.&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font style="font-size: 16px;"&gt;&lt;font face="Verdana, sans-serif"&gt;The implications extend far beyond phishing&lt;font color="#000000"&gt;.&lt;/font&gt;&lt;/font&gt; &lt;a href="https://www.gartner.com/en/newsroom/press-releases/2025-03-18-gartner-predicts-ai-agents-will-reduce-the-time-it-takes-to-exploit-account-exposures-by-50-percent-by-2027" target="_blank" style="color: rgb(0, 0, 0);"&gt;&lt;font face="Verdana, sans-serif"&gt;&lt;font color="#467886"&gt;&lt;strong&gt;Gartner&lt;/strong&gt;&lt;/font&gt;&lt;/font&gt;&lt;/a&gt; &lt;font face="Verdana"&gt;&lt;strong style=""&gt;predicts that by 2027, AI agents will reduce the time it takes to exploit account exposures by 50%, dramatically increasing the speed and scale of credential theft and account takeover attacks&lt;/strong&gt;&lt;font style=""&gt;. This trend highlights a critical shift toward automation in cybercrime, forcing organizations to rethink response strategies and invest in adaptive security models that can keep pace with evolving threats. Organizations that fail to anticipate this shift risk facing attacks that surpass traditional defenses, leaving critical systems exposed in a matter of minutes.&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Aptos, sans-serif"&gt;&lt;strong style=""&gt;&lt;font face="Verdana, sans-serif" color="#244667" style="font-size: 18px;"&gt;2. The Rise of Zero Trust Architecture&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;&lt;strong style=""&gt;Zero Trust Architecture (ZTA)&lt;/strong&gt; &lt;font style=""&gt;has transitioned from conceptual to operational, now embedded across critical sectors like finance, healthcare, and government. It mandates verification of every access request, independent of origin or device. Micro segmentation and continuous authentication are considered foundational practices.&lt;/font&gt; &lt;font color="#467886"&gt;&lt;a href="https://www.gartner.com/en/cybersecurity/topics/zero-trust-architecture" target="_blank" style=""&gt;&lt;font&gt;&lt;font&gt;&lt;strong&gt;Gartner&lt;/strong&gt;&lt;/font&gt;&lt;/font&gt;&lt;/a&gt;&lt;/font&gt; &lt;strong style=""&gt;predicts that by 2026, 10% of large enterprises will have a mature and measurable Zero Trust program in place.&lt;/strong&gt; &lt;font style=""&gt;This trend highlights the growing focus on building resilient security frameworks to counter evolving cyber threats.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Aptos, sans-serif"&gt;&lt;strong style=""&gt;&lt;font face="Verdana, sans-serif" color="#244667" style="font-size: 18px;"&gt;3. Rising Risks in Operational Technology&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;The rapid expansion of connected &lt;strong style=""&gt;Operational Technology (OT)&lt;/strong&gt; devices is introducing new vulnerabilities across enterprise and industrial environments. These systems, which control critical processes, are increasingly interconnected, making them attractive targets for cyberattacks. To reduce risk and maintain operational continuity, security teams are prioritizing measures such as firmware integrity checks and network segmentation.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font style="font-size: 16px;"&gt;&lt;font face="Verdana, sans-serif"&gt;Large-scale environments like smart cities and industrial systems face heightened exposure because of the sheer number and diversity of connected devices. &lt;strong style=""&gt;According to&lt;/strong&gt;&lt;/font&gt; &lt;a href="https://www.ibm.com/think/x-force/the-operational-technology-threat-landscape-insights-from-x-force" target="_blank" style="color: rgb(0, 0, 0);"&gt;&lt;font face="Verdana, sans-serif"&gt;&lt;font color="#467886"&gt;&lt;strong&gt;IBM’s&amp;nbsp;&lt;em&gt;Cost of a Data Breach Report&lt;/em&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/font&gt;&lt;/a&gt;&lt;strong style=""&gt;&lt;font face="Aptos, sans-serif" style="color: rgb(0, 0, 0);"&gt;,&lt;/font&gt; &lt;font face="Verdana" style=""&gt;the impact is significant: in 2025, 15% of organizations experienced OT-related breaches, and nearly a quarter of those incidents caused direct damage to OT systems or equipment, with an average cost of $4.56 million per breach.&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;This expanding attack surface demands a shift toward asset-centric security models and real-time monitoring to prevent lateral movement and supply chain compromise.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Aptos, sans-serif"&gt;&lt;strong style=""&gt;&lt;font face="Verdana, sans-serif" color="#244667" style="font-size: 18px;"&gt;4. Endpoint Detection and Response: The Frontline of Cyber Defense&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;In many cases, endpoints serve as the most accessible target for attackers. In a world of hybrid work and distributed networks, attackers often target laptops, mobile devices, and other endpoints as their primary entry point. Traditional antivirus tools, designed to detect known signatures, cannot keep up with advanced threats such as fileless malware, credential theft, and AI-driven exploits.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font style="font-size: 16px;"&gt;&lt;font face="Verdana, sans-serif"&gt;EDR takes a proactive approach by continuously collecting and analyzing data from every endpoint on the network, including processes, performance metrics, network connections, and user behaviors. By storing this data in a centralized cloud-based system, EDR enables security teams to identify anomalies quickly and respond before attackers can move deeper into the network. When a threat is detected, EDR can immediately isolate the compromised device, preventing further spread and minimizing impact.&lt;/font&gt; &lt;a href="https://www.ibm.com/think/topics/edr" target="_blank" style="color: rgb(0, 0, 0);"&gt;&lt;font face="Verdana, sans-serif"&gt;&lt;font color="#467886"&gt;&lt;strong&gt;IBM&lt;/strong&gt;&lt;/font&gt;&lt;/font&gt;&lt;/a&gt; &lt;font face="Verdana"&gt;&lt;strong style=""&gt;research shows that 90 percent of cyberattacks and 70 percent of breaches originate at endpoint devices, making robust monitoring and response capabilities a top priority.&lt;/strong&gt; &lt;font style=""&gt;Organizations that rely solely on traditional antivirus remain vulnerable to modern attack techniques. To maintain resilience and respond quickly to threats, EDR should be a core component of every security strategy.&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Aptos, sans-serif"&gt;&lt;strong style=""&gt;&lt;font face="Verdana, sans-serif" color="#244667" style="font-size: 18px;"&gt;5. Preparing for the Quantum Er&lt;/font&gt;&lt;font face="Verdana, sans-serif" color="#244667"&gt;&lt;font style="font-size: 18px;"&gt;a&lt;/font&gt;&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Post-Quantum Cryptography (PQC) introduces cryptographic algorithms designed to withstand the computational power of quantum computers, which threaten to break traditional encryption methods like RSA and ECC. Instead of relying on current mathematical problems vulnerable to quantum attacks, PQC uses lattice-based, hash-based, and multivariate polynomial schemes that remain secure even in a quantum-driven world.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font style="font-size: 16px;"&gt;&lt;font face="Verdana, sans-serif"&gt;The urgency for PQC adoption is growing as organizations recognize the long-term risk of “harvest now, decrypt later” attacks. Sensitive data encrypted today could be compromised in the future when quantum computing becomes mainstream.&lt;font color="#000000"&gt;&amp;nbsp;&lt;/font&gt;&lt;/font&gt;&lt;a href="https://www.gartner.com/en/articles/post-quantum-cryptography" target="_blank" style="color: rgb(0, 0, 0);"&gt;&lt;font face="Verdana, sans-serif"&gt;&lt;font color="#467886"&gt;&lt;strong&gt;Gartner&lt;/strong&gt;&lt;/font&gt;&lt;/font&gt;&lt;/a&gt; &lt;strong style=""&gt;&lt;font face="Verdana" style=""&gt;predicts that by 2029, advances in quantum computing will render applications, data, and networks protected by asymmetric cryptography unsafe, and by 2034, these methods will be fully breakable. Similarly, a&lt;/font&gt;&lt;/strong&gt; &lt;a href="https://www.forbes.com/councils/forbestechcouncil/2025/11/19/quantum-computings-threat-to-global-security-how-we-must-respond/" target="_blank" style="color: rgb(0, 0, 0);"&gt;&lt;font face="Verdana, sans-serif"&gt;&lt;font color="#467886"&gt;&lt;strong&gt;Forbes Technology Council report&lt;/strong&gt;&lt;/font&gt;&lt;/font&gt;&lt;/a&gt; &lt;strong style=""&gt;&lt;font face="Verdana" style=""&gt;highlights that&amp;nbsp;quantum computing is now considered a top emerging cybersecurity threat, prompting U.S. policymakers to push for immediate preparation across both government and industry.&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;PQC allows organizations to strengthen their encryption for the future while maintaining efficiency and compatibility with existing systems. By integrating quantum-safe algorithms into existing systems, businesses can maintain compliance, secure cloud environments, and protect IoT ecosystems against next-generation threats. This shift transforms cryptography from a static safeguard into a resilient, adaptive defense for the quantum era.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" color="#244667" style="font-size: 16px;"&gt;&lt;strong style=""&gt;Conclusion&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Cybersecurity in 2026 is about staying ahead of threats before they emerge. AI-powered defenses, Zero Trust principles, and quantum-resistant cryptography are becoming standard practices for organizations that want to remain resilient. The companies that treat security as a core business strategy will be best positioned to protect assets, uphold compliance, and foster sustainable growth.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font color="#244667" face="Verdana" style="font-size: 16px;"&gt;&lt;strong style=""&gt;Strengthen Your Cybersecurity Strategy&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Aptos, sans-serif" style="font-size: 16px;"&gt;&lt;font face="Verdana, sans-serif" style=""&gt;At The Greentree Group, we help organizations protect critical data with comprehensive cybersecurity solutions. We work with federal, state, local, and commercial clients to identify threats, prevent vulnerabilities, and strengthen system security. Contact us today to take a proactive step toward securing your business.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana, sans-serif" color="#244667" style="font-size: 16px;"&gt;About The Author:&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Aptos, sans-serif" style="font-size: 14px;"&gt;&lt;em style=""&gt;&lt;span style="background-color: white;"&gt;&lt;font face="Verdana, sans-serif" style=""&gt;Mackenzie Cole is an Analyst at The Greentree Group&lt;/font&gt;&lt;/span&gt;&lt;span style="background-color: white;"&gt;&lt;font face="Verdana, sans-serif"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;span style="background-color: white;"&gt;&lt;font face="Verdana, sans-serif" style=""&gt;and a proud Wright State University alum, specializing in marketing strategy and analytics. With a passion for turning insights into impactful campaigns, Mackenzie has worked on a variety of multi-channel marketing initiatives with a focus on technology, creative storytelling, and connecting with local communities through purpose-driven marketing.&lt;/font&gt;&lt;/span&gt;&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13567632</link>
      <guid>https://www.technologyfirst.org/Tech-News/13567632</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Thu, 16 Oct 2025 18:08:48 GMT</pubDate>
      <title>Your Roadmap to CMMC Compliance: Key Steps for Defense Contractors</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Newsletter/2025/Tom%20Saul%20Blog%20November%20v2.png" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;/p&gt;

&lt;div style="margin-left: 2em"&gt;
  &lt;p style="line-height: 18px;"&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;As cybersecurity threats grow more sophisticated, the U.S. Department of Defense (DoD) has taken decisive action to protect sensitive data across its supply chain. The Cybersecurity Maturity Model Certification (CMMC) is now embedded. For organizations in the Defense Industrial Base (DIB), this is not just a regulatory shift—it’s a strategic imperative.&lt;/font&gt;&lt;/p&gt;

  &lt;p style="line-height: 18px;"&gt;&lt;font style="font-size: 16px;" face="Verdana" color="#01507A"&gt;&lt;strong&gt;Why CMMC Matters&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

  &lt;p style="line-height: 18px;"&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;CMMC is a tiered certification framework designed to safeguard &lt;strong&gt;Controlled Unclassified Information (CUI)&lt;/strong&gt; and &lt;strong&gt;Federal Contract Information (FCI)&lt;/strong&gt;. Whether you're a prime contractor or a subcontractor, if you handle either type of data, you must comply.&lt;/font&gt;&lt;/p&gt;

  &lt;p style="line-height: 18px;"&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;The program includes three assessment levels:&lt;/font&gt;&lt;/p&gt;

  &lt;p style="line-height: 18px;"&gt;&lt;strong style="font-size: 16px; font-family: Verdana;"&gt;Level 1:&lt;/strong&gt; &lt;font style="font-size: 16px; font-family: Verdana;"&gt;Annual self-assessment for FCI.&lt;/font&gt;&lt;br&gt;
  &lt;strong style="font-size: 16px; font-family: Verdana;"&gt;Level 2:&lt;/strong&gt; &lt;font style="font-size: 16px; font-family: Verdana;"&gt;Self or third-party assessment for CUI.&lt;/font&gt;&lt;br&gt;
  &lt;font face="Verdana"&gt;&lt;font style="font-size: 16px;"&gt;&lt;strong&gt;Level 3:&lt;/strong&gt; &lt;font&gt;Government-led assessment for highly sensitive CUI.&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

  &lt;p style="line-height: 18px;"&gt;&lt;font style="font-size: 16px;" face="Verdana" color="#01507A"&gt;&lt;strong&gt;Why Compliance Is Urgent&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

  &lt;p style="line-height: 18px;"&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;The final CMMC rule (32 CFR Part 170) took effect &lt;strong&gt;December 16, 2024&lt;/strong&gt;, and the acquisition rule (48 CFR Part 204) becomes enforceable &lt;strong&gt;November 10, 2025&lt;/strong&gt;. Non-compliance can result in:&lt;/font&gt;&lt;/p&gt;

  &lt;ul&gt;
    &lt;li&gt;&lt;span style=""&gt;Disqualification from DoD contracts.&lt;/span&gt;&lt;/li&gt;

    &lt;li&gt;&lt;span style=""&gt;Legal risks under the&lt;/span&gt; &lt;strong style="font-family: Verdana, sans-serif; font-size: 16px;"&gt;False Claims Act&lt;/strong&gt;&lt;span style=""&gt;.&lt;/span&gt;&lt;/li&gt;

    &lt;li&gt;&lt;span style=""&gt;Reputational damage.&lt;/span&gt;&lt;/li&gt;
  &lt;/ul&gt;

  &lt;p style="line-height: 18px;"&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;Contractors must affirm continuous compliance in the &lt;strong&gt;Supplier Performance Risk System (SPRS)&lt;/strong&gt;, and all requirements flow down to subcontractors.&lt;/font&gt;&lt;/p&gt;

  &lt;p style="line-height: 18px;"&gt;&lt;font style="font-size: 16px;" face="Verdana" color="#01507A"&gt;&lt;strong style=""&gt;Building Your Compliance Roadmap&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

  &lt;p style="line-height: 18px;"&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;Achieving CMMC compliance is a journey and is not a point-in-time process. Breaking this workload down into actionable steps is critical to maintaining focus. Here’s a phased approach:&lt;/font&gt;&lt;/p&gt;

  &lt;p style="line-height: 18px;"&gt;&lt;font style="font-size: 16px;"&gt;&lt;strong style=""&gt;&lt;font face="Verdana" style="" color="#01507A"&gt;1. Understand the Framework:&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

  &lt;ul&gt;
    &lt;li&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;Familiarize yourself with CMMC’s structure, domains, and practices. Map requirements to NIST SP 800-171 controls, and clarify whether your organization handles FCI, CUI, or both.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;Another critical element is to review cloud providers and other connected systems begin to identify shared responsibilities through a Share Responsibility / Customer Responsibility Matrix.&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;

  &lt;p style="line-height: 18px;"&gt;&lt;font style="font-size: 16px;"&gt;&lt;strong style=""&gt;&lt;font face="Verdana" style="" color="#01507A"&gt;2. Readiness Assessment:&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

  &lt;ul&gt;
    &lt;li&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Determine your required CMMC level. This can be done through a review of your current contracts or through a conversation with your contract officer.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Review your current policies, procedures, and technical configurations. Documentation is key in achieving and maintaining CMMC compliance.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Conduct a gap analysis to identify areas needing improvement. Engaging with professionals who can provide guidance and expertise is crucial to help identify true gaps and to align business processes&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;

  &lt;p style="line-height: 18px;"&gt;&lt;font style="font-size: 16px;"&gt;&lt;strong style=""&gt;&lt;font face="Verdana" style="" color="#01507A"&gt;3. Planning &amp;amp; Resourcing:&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

  &lt;ul&gt;
    &lt;li&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Develop a Plan of Action &amp;amp; Milestones (POA&amp;amp;M) to address gaps. This should be done at the objective level. This should also include prioritizing and budgeting for remediation.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Assign clear roles, define workflows, and identify necessary technology. Having a project manager or subject matter expert assigned to your compliance journey is essential.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Engage with certified experts and ensure internal ownership of compliance. The implementation of controls and objectives can be confusing. Having an expert that can give you advice and solutions will ensure that your interpretation of how you are meeting the controls does not cause you issue when it comes to an official assessment.&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;

  &lt;p style="line-height: 18px;"&gt;&lt;font style="font-size: 16px;"&gt;&lt;strong style=""&gt;&lt;font face="Verdana" style="" color="#01507A"&gt;4. Implementation:&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

  &lt;ul&gt;
    &lt;li&gt;&lt;font face="Times New Roman" style="font-size: 9px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Update policies and procedures. Documentation is key in achieving compliance. Having clearly documented policies and procedures that address specific controls is necessary. Engaging with policy experts to ensure solid documentation is highly recommended.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;“Document what you do, do what you document”&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Enforce access controls. A key component of CMMC compliance is ensuring that only authorized users have access to the system and, furthermore, have access to CUI.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Deploy technical safeguards like encryption, a SIEM, MFA and endpoint protection.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Establish incident response and change control processes. Make sure that these processes are followed and that there is an audit trail so that the assessor can be provided with evidence.&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;

  &lt;p style="line-height: 18px;"&gt;&lt;font style="font-size: 16px;"&gt;&lt;strong style=""&gt;&lt;font face="Verdana" style="" color="#01507A"&gt;5. Continuous Monitoring:&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

  &lt;ul&gt;
    &lt;li&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Treat compliance as an ongoing effort. This includes documenting reviews, auditing processes, defining audit logs and audit review processes, and constantly ensuring that documentation is in line with implementation.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Use tools like SIEM and other alerting mechanisms to assist with audits of controls and objectives. &amp;nbsp;&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Keep your POA&amp;amp;M updated as risks to your environment and compliance posture evolve.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Avoid superficial compliance and conduct mock assessments to uncover gaps.&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;

  &lt;p style="line-height: 18px;"&gt;&lt;font style="font-size: 16px;" face="Verdana" color="#01507A"&gt;&lt;strong style=""&gt;Preparing for the Assessment&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

  &lt;ul&gt;
    &lt;li style="line-height: 18px;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Don’t just check boxes—tell a defensible story. Your System Security Plan (SSP), POA&amp;amp;M, and supporting documentation should clearly demonstrate how controls and objectives are implemented and enforced.&lt;/font&gt;&lt;/li&gt;

    &lt;li style="line-height: 18px;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Use real-world examples to show how controls are implemented. Be prepared to guide the assessor through your implementation and compliance.&lt;/font&gt;&lt;/li&gt;

    &lt;li style="line-height: 18px;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Conduct mock assessments to uncover gaps before the official evaluation. It is always a good to check with designated experts to be sure you are in alignment. Contracting with a C3PAO (Certified 3&lt;sup&gt;rd&lt;/sup&gt; Party Assessment Organization) to conduct a mock assessment before your official assessment will allow for you to correct any known deficiencies before they are officially recorded.&lt;/font&gt;&lt;/li&gt;

    &lt;li style="line-height: 18px;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Embed compliance into daily operations through automation and regular staff training. CMMC compliance is a culture shift for the entire organization.&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;

  &lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" style="font-size: 16px;" color="#01507A"&gt;&lt;strong style=""&gt;Real-World Lessons&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

  &lt;p style="line-height: 18px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 16px;"&gt;A case study from ProStratus highlights the value of a structured approach:&lt;/font&gt;&lt;/p&gt;

  &lt;ul&gt;
    &lt;li style="line-height: 18px;"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;Conducting a thorough gap analysis and building a tailored POA&amp;amp;M.&lt;/font&gt;&lt;/li&gt;

    &lt;li style="line-height: 18px;"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;Embedding compliance into daily operations and culture.&lt;/font&gt;&lt;/li&gt;

    &lt;li style="line-height: 18px;"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;Ensuring that documented policies and procedures are clear, outline “actual” implementations and used throughout the organization.&lt;/font&gt;&lt;/li&gt;

    &lt;li style="line-height: 18px;"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;Go into the assessment being able to prove all 110 controls and 320 objectives. You should not go into the assessment with a POAM.&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;

  &lt;p style="line-height: 18px;"&gt;&lt;font style="font-size: 16px;"&gt;&lt;strong style=""&gt;&lt;font face="Verdana" style="" color="#01507A"&gt;Common Pitfalls&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

  &lt;ul&gt;
    &lt;li&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Over-reliance on generic templates&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Neglecting documentation&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Lack of internal ownership&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Treating compliance as a one-time project&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Trying to complete this journey alone.&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;

  &lt;p style="line-height: 18px;"&gt;&lt;font style="font-size: 16px;"&gt;&lt;strong style=""&gt;&lt;font face="Verdana" style="" color="#01507A"&gt;Success Factors&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

  &lt;ul&gt;
    &lt;li&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Leadership buy-in. A C-Level champion is absolutely necessary for success.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Clear documentation that identifies addressed controls and objectives.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Proactive security culture that addresses ALL employees and avoids siloing security and compliance to a “team.”&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Treating compliance as a strategic advantage. The amount of time and energy that is necessary for achieving CMMC Level 2 is enormous, but this is also an opportunity to set your organization apart from competitors and assure primes and officiating bodies that you are serious about protecting sensitive data.&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;&lt;strong style=""&gt;&lt;font color="#01507A"&gt;Bottom Line:&lt;/font&gt;&lt;/strong&gt;&lt;font style=""&gt;&lt;br&gt;
CMMC compliance is not just a regulatory hurdle—it’s an opportunity to strengthen your organization’s security posture and stand out in the defense contracting space. Start early, build a culture of compliance, and leverage expert guidance to ensure success.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;" align="center"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;&lt;font style=""&gt;###&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana"&gt;&lt;span style="font-size: 12px;"&gt;&lt;strong&gt;About the Author&lt;/strong&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" style="font-size: 12px;"&gt;&lt;a href="https://www.linkedin.com/company/prostratus/" target="_blank"&gt;ProStratus&lt;/a&gt;&amp;nbsp;is a CMMC Level 2 certified managed security service provider, delivering secure IT solutions across the Defense Industrial Base. &lt;a href="https://www.linkedin.com/in/thomas-saul-cca/" target="_blank"&gt;Thomas Saul&lt;/a&gt; is the Director of Security and Compliance for ProStratus and is a Certified CMMC Assessor (CCA) who specializes in helping organizations operationalize compliance and building cybersecurity into daily operations.&lt;/font&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13553011</link>
      <guid>https://www.technologyfirst.org/Tech-News/13553011</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Thu, 16 Oct 2025 18:03:33 GMT</pubDate>
      <title>Pillars for an Autonomous Future</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Newsletter/2025/Bill%20Magnuson%20blog%20November%20V2.png" alt="" title="" border="0"&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;" align="left"&gt;&lt;font face="Verdana" color="#01507A" style="font-size: 16px;"&gt;&lt;strong style=""&gt;Navigating the Shift to Smarter, Self-Running Experiences&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;Customer experience, or CX, is the sum of every interaction a customer has with your brand, from the first app notification to the final thank-you email. It's not confined to call centers; it's the seamless thread weaving through every touchpoint in a business, shaping loyalty in an era where expectations soar. Imagine a world where these experiences don't just react to needs. They anticipate them, resolve hiccups before they arise, and evolve effortlessly without endless human intervention. That is the autonomous CX landscape on the horizon, where AI doesn't replace people but amplifies them, touching every corner of operations in retail, finance, healthcare, education, and beyond. As industries race toward this future, four foundational pillars—strategic vision, quality assurance, training rigor, and mechanical integration—stand out as the blueprint for success. This is not just theory. It is an unfolding story of transformation, from today's reactive support to tomorrow's predictive powerhouses across all customer-facing channels. Let's dive in, exploring how these pillars build resilient, engaging journeys that keep your audience hooked and your operations ahead.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" color="#01507A" style="font-size: 16px;"&gt;&lt;strong&gt;Pillar 1: Strategic Vision, Charting the Course Beyond the Budget&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;Every great shift starts with a map. In the rush to AI, too many leaders fixate on tools and costs, missing the bigger picture: Where is your CX headed in an autonomous era? Strategic vision demands asking bold questions. How will AI evolve your client interactions across apps, in-store visits, and virtual consultations? What seamless experiences will set you apart by 2030?&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;Picture customer hubs evolving from fragmented silos into dynamic ecosystems, where normalized, profiled information fuels multi-agent systems. Front-line AI handles routine queries in chatbots or kiosks, escalating to specialized "supervisors" that tap deeper insights, handing off to humans only when nuance calls for it. This is not about slashing expenses. It is about directional transformation, prioritizing long-term client loyalty over short-term wins in every business domain. Without this north star, deployments falter into chaos. Engage your teams by co-creating these roadmaps. Start with workshops that paint vivid "day-in-the-life" scenarios, turning abstract strategy into tangible excitement for non-technical staff and data-driven insights for technical experts.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" color="#01507A" style="font-size: 16px;"&gt;&lt;strong&gt;Pillar 2: Quality Assurance, The Glue Holding It All Together&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;In an autonomous world, consistency is not optional. It is the heartbeat of trust. Quality assurance ensures every AI interaction feels polished, reliable, and human-touched, even when it is not, whether in a drive-thru order or a personalized email campaign. Think real-time coaching: Scripts, prompts, and oversight that mirror elite outsourcing teams, grading interactions on sentiment, flow, and resolution.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;Envision transcribing 100 percent of interactions to forge knowledge repositories, not just for compliance, but to train behaviors that delight across channels. In high-stakes sectors like finance or education, this pillar prevents drift. Tools for consistent reporting flag anomalies early, like a customer's frustration spiking mid-conversation on a mobile app. The payoff? Frictionless experiences that boost retention business-wide. To keep readers riveted, frame quality as a narrative hero. Share anonymized "before-and-after" stories in your internal comms, showing how one overlooked metric turned a complaint cascade into rave reviews, resonating with CXOs eyeing ROI and frontline teams craving simplicity.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" color="#01507A" style="font-size: 16px;"&gt;&lt;strong&gt;Pillar 3: Training Rigor, Building AI That Learns Like Humans&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;Autonomy thrives on adaptability, and that is where training rigor shines. Gone are static models. Enter AI that ingests personas—style guides and prompts tailored for customer-facing finesse—while undergoing relentless coaching cycles. It is like raising a digital apprentice: Start with zero knowledge base, feed it transcribed dialogues, regional dialects (hello, Southern US inflections), and iterative feedback to refine accuracy in emails, chats, or voice assistants.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;This pillar powers the story's turning point: From clunky bots to intuitive agents that personalize on the fly, like suggesting "your usual sausage biscuit" based on geolocation and past orders during an in-app upsell. For resource-strapped teams, like nonprofits dodging DIY pitfalls, lean on accessible platforms for workflow training and agent licenses, bypassing unguided tools that promise quick fixes but deliver frustration. Make training engaging by gamifying it. Leaderboards for "best anomaly hunts" (spotting order errors via license plates) turn compliance into collaboration, preparing workforces for a job market craving self-motivated learners over rote specialists—appealing to technical builders and visionary leaders alike.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" color="#01507A" style="font-size: 16px;"&gt;&lt;strong&gt;Pillar 4: Mechanical Integration, The Engines of Seamless Automation&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;No autonomous tale is complete without the machinery that makes it hum. Mechanical integration weaves robotics and edge tech into the fabric of CX, handling the grunt work so humans focus on magic, from warehouse fulfillment to personalized retail recommendations. Dual cameras spotting menu items with yes/no precision? Edge-localized machine learning slashing voice latency to milliseconds? Headset analytics canceling noise while monitoring volume trends? These are not gadgets. They are the plot devices propelling us forward.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;From burger-flipping arms streamlining prep to shelf-scanning bots enforcing planograms with image-code smarts, this pillar scales repetition into reliability across supply chains and service desks. Autonomous prototypes in quick-service spots run end-to-end robotic ops, while manufacturing cameras enforce glove checks for safety. Early costs are low, but watch for upticks as efficiencies compound, like cloud trends on steroids. Hook your audience with demos. Virtual tours of edge-powered point-of-sale systems surviving outages prove how mechanical muscle delivers outage-proof speed and sparks innovation across retail, healthcare tele-health, or beyond, bridging the gap for non-technical users with visuals and CXOs with scalability metrics.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" color="#01507A" style="font-size: 16px;"&gt;&lt;strong&gt;Weaving the Pillars into Your Autonomous Story&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;These four pillars are not silos. They interlock to narrate a compelling arc: From data chaos to predictive bliss, reactive fixes to proactive delight in every customer touchpoint. High-level steps to get started? First, audit your data for strategic alignment. Second, pilot quality-focused transcriptions in one channel. Third, roll out persona training with regional tweaks. Fourth, integrate mechanical pilots for latency-sensitive tasks. Fifth, cycle through refinements, benchmarking against 5-year adoption curves.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;The risks? Deepfakes from mere minutes of media, fraud via unchecked access, or cost swings from unchecked scaling. Counter with multi-factor authentication, anomaly detection, and vigilant oversight. The reward? Unified channels yielding hyper-personalized, resilient CX that captivates customers and empowers teams, positioning every forward-thinking business for enduring success.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;As we edge toward this autonomous horizon, the question is not if, but how boldly you will lead the change. Dive deeper into these pillars to craft your organization's next chapter one where CX isn't a department, but the defining edge of your entire enterprise.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;" align="left"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;####&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" style="font-size: 12px;"&gt;About The Author&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Verdana" style="font-size: 12px;"&gt;&lt;a href="https://www.linkedin.com/in/bill-magnuson/" target="_blank"&gt;Bill Magnuson&lt;/a&gt; is a seasoned leader in technology transformation, with a strong background in driving innovation, strategic growth, and operational excellence. He combines business acumen with tech expertise to help organizations modernize, scale sustainably, and deliver greater value to customers.&lt;/font&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13553001</link>
      <guid>https://www.technologyfirst.org/Tech-News/13553001</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Tue, 23 Sep 2025 18:16:13 GMT</pubDate>
      <title>Compliance And Risk-Management Are Part of Cybersecurity Too</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/Barry%20Hassler%20Blog%20October%202025.png" alt="" title="" border="0"&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li style="list-style: none; display: inline"&gt;
    &lt;p style="line-height: 19px;"&gt;&lt;font face="Verdana"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;Organizations tend to think that if they deploy EDR (Endpoint Detection and Response) solutions on their workstations, they are “safe” from malware. While EDR is a powerful tool in detecting and responding to threats, it’s only one piece of a much larger cybersecurity puzzle.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;p style="line-height: 19px;"&gt;&lt;font face="Verdana"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;True Cybersecurity isn’t just about technology—it’s about governance, process, and accountability. Compliance frameworks like NIST, HIPAA, PCI and GDPR aren’t just bureaucratic checkboxes; they provide structured approaches to managing risk, protecting data, and ensuring resilience. Even your basic Cyber Insurance policy requires your thoughtful responses to Self-Assessment Applications and proof of compliance. Risk management, meanwhile, helps organizations identify vulnerabilities beyond the technical layer—such as third-party risks, insider threats, and operational weaknesses.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;p style="line-height: 19px;"&gt;&lt;font face="Verdana"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;Without a strong compliance and risk management foundation, even the best technical defenses can fall short. Cybersecurity must be holistic, integrating people, processes, and technology. Organizations that treat compliance and risk management as core components of their security strategy are better positioned to prevent breaches, respond effectively, and maintain trust.&amp;nbsp;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;h1 style="line-height: 31px;"&gt;&lt;/h1&gt;

    &lt;h5&gt;&lt;font face="Verdana"&gt;&lt;font color="#0F4761" face="Aptos Display, sans-serif" style="font-size: 27px;"&gt;Why are we so concerned about Cybersecurity?&lt;/font&gt;&lt;/font&gt;&lt;/h5&gt;

    &lt;p style="line-height: 19px;"&gt;&lt;font face="Verdana"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;We all hear the headlines about data breaches and the pain they cause in terms of lost privacy, lost revenue while systems are recovered, and expensive recovery costs. &amp;nbsp;Look at these recent statistics, and just think of the recent major breach in our own backyard with Kettering Health Network:&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li style="list-style: none; display: inline"&gt;
    &lt;ul&gt;
      &lt;li&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;“&lt;em&gt;It takes organizations an average of 204 days to IDENTIFY a data breach and 73 days to CONTAIN it&lt;/em&gt;” (Bonnie). In the case of Kettering Health Network, the breach may have gone undetected for up to six weeks (Bruce), and back to full operation in 3 weeks (Alder).&lt;/font&gt;&lt;/li&gt;

      &lt;li&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;“&lt;em&gt;74% of all breaches include the human element&lt;/em&gt;” (Bonnie).&lt;/font&gt;&lt;/li&gt;

      &lt;li&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;“&lt;em&gt;12% of employees took sensitive IP with them when they left an organization, including customer data, employee data, health records, and sales contracts&lt;/em&gt;” (Bonnie).&lt;/font&gt;&lt;/li&gt;
    &lt;/ul&gt;
  &lt;/li&gt;

  &lt;li style="list-style: none; display: inline"&gt;
    &lt;p style="line-height: 19px;"&gt;&lt;font face="Verdana"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;The reality in today’s environment is that email-based “Business Email Compromise” (BEC), or “Phishing” now causes 36% of Cybersecurity breaches (Spys). These types of compromises are aimed at getting a user to divulge the username and password for a critical resource like their email. In many environments that depend on a cloud-based infrastructure like Microsoft 365 (or Google Workspace among others), gaining access to your email also gives access to OneDrive and Sharepoint data the user has access to.&amp;nbsp; Premises-based systems with on-site servers are not immune to compromise either. Attackers target these systems with downloaded documents or programs designed to deceive users into opening or executing them.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;p style="line-height: 19px;"&gt;&lt;font face="Verdana"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;Note above that “74% of data breaches involve the human element.” Thus, we need to protect the resources that users have access to and train them how to detect and respond to these compromise attempts.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;h5&gt;&lt;font face="Verdana"&gt;&lt;font color="#0F4761" style="font-size: 27px;"&gt;So what’s the right path?&lt;/font&gt;&lt;/font&gt;&lt;/h5&gt;

    &lt;p style="line-height: 19px;"&gt;&lt;font face="Verdana"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;As an MSP, we recommend a layered approach to security and compliance for overall risk management. Even the way cloud resources such as Microsoft 365 are implemented is important to the overall security of an organization.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;p style="line-height: 19px;"&gt;&lt;font face="Verdana"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;Before moving into advanced Compliance and Risk-Management solutions, it’s important to first review the workstation and server basics that serve as the foundation for enhanced security, compliance, and risk management.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;h2 style="line-height: 25px;"&gt;&lt;font face="Verdana"&gt;&lt;font color="#0F4761" style="font-size: 21px;"&gt;Workstation (Endpoint) Basics:&lt;/font&gt;&lt;/font&gt;&lt;/h2&gt;

    &lt;p style="line-height: 19px;"&gt;&lt;font face="Verdana"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;&lt;strong style=""&gt;Microsoft 365 Premium&lt;/strong&gt; or equivalent accounts for advanced security and compliance features such as Microsoft Defender, Purview, Azure Active Directory and Intune.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;p style="line-height: 19px;"&gt;&lt;font face="Verdana"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;&lt;strong&gt;Patch Management&lt;/strong&gt; – MSP Management provides additional oversight into Patch Management to better control the patch process and allow oversight and additional approval for those occasional times when Microsoft releases patches with unexpected side-effects.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;p style="line-height: 19px;"&gt;&lt;font face="Verdana"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;&lt;strong&gt;Endpoint Detection and Response (EDR)&lt;/strong&gt; -- continuously monitors endpoints for evidence of threats and performs automatic actions to help mitigate them. Do note that EDR is only monitoring the endpoints themselves.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;p style="line-height: 19px;"&gt;&lt;font face="Verdana"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;&lt;strong style=""&gt;Backup for Microsoft 365 Email, OneDrive and SharePoint&lt;/strong&gt;. By default, Microsoft provides no “backup” of your Microsoft 365 data (email, SharePoint and OneDrive) -- only a guaranteed level of service. Thus, a backup solution is needed to protect your data.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;h2 style="line-height: 25px;"&gt;&lt;font face="Verdana"&gt;&lt;font color="#0F4761" style="font-size: 21px;"&gt;Server Basics&lt;/font&gt;&lt;/font&gt;&lt;/h2&gt;

    &lt;p style="line-height: 19px;"&gt;&lt;font face="Verdana"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;For clients still using servers, those resources need to be protected as well – to at least the same degree of protection as the workstations. Servers need to be deployed with similar Patch Management, EDR and backup solutions. Servers should have complete immutable and secure backups to enable granular file restores as well as “bare-metal” restores for disaster recovery.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;h2 style="line-height: 25px;"&gt;&lt;font face="Verdana"&gt;&lt;font color="#0F4761" style="font-size: 21px;"&gt;Better Security&lt;/font&gt;&lt;/font&gt;&lt;/h2&gt;

    &lt;h3 style="line-height: 22px;"&gt;&lt;font face="Verdana"&gt;&lt;font color="#0F4761" style="font-size: 19px;"&gt;Protecting the “network”&lt;/font&gt;&lt;/font&gt;&lt;/h3&gt;

    &lt;p style="line-height: 19px;"&gt;&lt;font face="Verdana"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;Building on the basic protections at the workstation and server level, additional protections need to be deployed to further protect your resources. While EDR-based solutions will detect and respond to a great majority of “downloaded” compromises, EDR won’t detect those cases where an attacker gains access to your cloud-based data, or other important external websites.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;p style="line-height: 19px;"&gt;&lt;font face="Verdana"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;&lt;strong&gt;MDR/XDR solutions&lt;/strong&gt; add to the “endpoint” EDR. MDR is “Managed Detection and Recovery” and adds real-time analysis of cloud-based environments as well as integration with EDR and other devices such as firewalls and other network devices. MDR digests data from all these platforms in real-time, analyzes and provides automated and human response as necessary. Thus, MDR solutions provide a much more proactive, real-time solution for a much broader view of the entire network.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;p style="line-height: 19px;"&gt;&lt;font face="Verdana"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;&lt;strong&gt;Web Filtering&lt;/strong&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;p style="line-height: 19px;"&gt;&lt;font face="Verdana"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;Web Filtering solutions provide the ability to “categorize” web activities and allow or deny access to categories of websites based on an organization's needs. Most solutions also have the built-in capability to automatically deny access to known “command and control” or known infected systems that are a primary source of actual malware. The web filtering solutions thus provide an additional level of protection by preventing access to a malicious website that a user may inadvertently access through an email link or document that references an external site to download malware.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;h3 style="line-height: 22px;"&gt;&lt;font face="Verdana"&gt;&lt;font color="#0F4761" style="font-size: 19px;"&gt;Protecting the Human Resources&lt;/font&gt;&lt;/font&gt;&lt;/h3&gt;

    &lt;p style="line-height: 19px;"&gt;&lt;font face="Verdana"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;Since the Human Element is still a primary weak point in Cybersecurity defense, we suggest training and testing the users, to provide them the knowledge tools they need to combat breach attempts. Regular Cybersecurity awareness training generally leads to a 70% reduction in security-related risks (Keepnet).&amp;nbsp; A regular regime of monthly targeted short training videos, slide decks or other web-based materials on pertinent topics such as how to spot phishing attempts, social engineering, safe surfing and password management helps keep people more aware and less apt to fall for a phishing or other breach attempt. Furthermore, regular simulated phish messages, configured to bypass filtering&amp;nbsp; can test the users to see how they actually perform against phishing attempts.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;h5&gt;&lt;font face="Verdana"&gt;&lt;font color="#0F4761" style="font-size: 27px;"&gt;So where does Compliance and Risk Management come into play?&lt;/font&gt;&lt;/font&gt;&lt;/h5&gt;

    &lt;p style="line-height: 19px;"&gt;&lt;font face="Verdana"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;All the above topics relate primarily to prevention. All this is fine and good until the prevention measures fall short. At some point, no matter how many blocks are put in place against malware, something will slip by. A breach to almost any organization can prove catastrophic.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;p style="line-height: 19px;"&gt;&lt;font face="Verdana"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;Cyber Insurance is becoming almost mandatory for any business to protect their assets in the event of any sort of breach. The challenge is that many organizations complete the Cyber Insurance questionnaire by checking boxes—without confirming that proper procedures or evidence are actually in place. For example, a common question is: “Have you implemented strong password policies?” Simply telling employees to use strong passwords isn’t enough to qualify as a valid “yes.”&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;p style="line-height: 19px;"&gt;&lt;font face="Verdana"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;If a breach occurs, your insurance provider will expect proof that all conditions were met. Without it, your claim will likely be denied.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;p style="line-height: 19px;"&gt;&lt;font face="Verdana"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;Recent studies show that more than 40% of Cyber Insurance claims go unpaid—most often because of incomplete, inaccurate, or misleading information provided on the application (Asaff).&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;p style="line-height: 19px;"&gt;&lt;font face="Verdana"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;The Cyber Insurance questionnaires are treated as factual statements. If discrepancies are discovered during a claim review, they can become grounds for denial of coverage.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;p style="line-height: 19px;"&gt;&lt;font face="Verdana"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;Going further than Cyber Insurance, many organizations are subject to federal, state, and industry regulations that put further compliance requirements on organizations. For instance, any organization dealing with medical data is subject to stringent HIPAA regulations. Any financial-related organization is subject to FTC Safeguard regulations. Any organization that handles credit cards is subject to PCI requirements. Many of these regulations carry very stiff penalties for non-compliance and in the event of a breach, can be disastrous to the organizations if they aren’t diligent in their policies, procedures, controls and evidence.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;h2 style="line-height: 25px;"&gt;&lt;font face="Verdana"&gt;&lt;font color="#0F4761" style="font-size: 21px;"&gt;So how do you ensure compliance?&lt;/font&gt;&lt;/font&gt;&lt;/h2&gt;

    &lt;p style="line-height: 19px;"&gt;&lt;font face="Verdana"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;To fully protect your organization, any Cyber Insurance policy requirements as well as further federal, state and industry regulations must be strictly met. The various protections mentioned earlier for endpoints, servers and network are only a starting point. Compliance is more than just completing a checklist saying you are doing everything needed. Organizations must have clear policies in place, acknowledged by all relevant employees, along with procedures and controls that put those policies into action. Equally important is maintaining ongoing evidence to demonstrate that these measures are effective.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;p style="line-height: 19px;"&gt;&lt;font face="Verdana"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;Compliance isn’t a one-time task—it’s an ongoing process that requires continuous testing, monitoring, and review to ensure lasting protection and effectiveness.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;p style="line-height: 19px;"&gt;&lt;font face="Verdana"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;Regular network scans (quarterly is best, or at minimum annually) that automatically analyze the environment for Patch Management, stored personal information (PII), weak passwords or poor password management, and out-of-date software can provide excellent data on a regular basis. Automated analysis of a cloud-based environment provides valuable information for further review or action.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;p style="line-height: 19px;"&gt;&lt;font face="Verdana"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;Additionally, maintaining a regular cadence of policy creation, review, and employee acknowledgment ensures that the entire organization has clear documentation and procedures in place. Recommended or required policies may include:&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li style="list-style: none; display: inline"&gt;
    &lt;ul&gt;
      &lt;li&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;Acceptable Use Policy&lt;/font&gt;&lt;/li&gt;

      &lt;li&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;Access Control Policy&lt;/font&gt;&lt;/li&gt;

      &lt;li&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;Remote Access (work from home) Policy&lt;/font&gt;&lt;/li&gt;

      &lt;li&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;Backup and Recovery Policy&lt;/font&gt;&lt;/li&gt;

      &lt;li&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;Vendor Risk Management Policy&lt;/font&gt;&lt;/li&gt;

      &lt;li&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;Security Awareness Policy&lt;/font&gt;&lt;/li&gt;
    &lt;/ul&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;p style="line-height: 19px;"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;One of the most important policies then becomes an &lt;strong style=""&gt;Incident Response Policy&lt;/strong&gt; &lt;strong style=""&gt;and Procedure&lt;/strong&gt; (IRPP) that defines how your organization will respond to a variety of incidents as well as a &lt;strong style=""&gt;Written Information Security Plan (WISP)&lt;/strong&gt; that provides the full suite of documentation that can be used to prove compliance to any regulations that apply to the organization.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 19px;"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;These policies need to be backed up with procedures and acceptance/acknowledgement by all pertinent staff members&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 19px;"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;A platform that combines appropriate regulation selection, their required policies and controls, automated third-party scanning (internal and external vulnerability analysis including endpoints, cloud environment and internet interfaces), accepted policy templates, automatic policy acceptances, automated and manual evidence collection and WISP creation makes compliance and risk management easier, faster, and far less stressful for your organization.&lt;/font&gt;&lt;/p&gt;

&lt;h5&gt;&lt;font color="#0F4761" face="Verdana" style="font-size: 27px;"&gt;Conclusion&lt;/font&gt;&lt;/h5&gt;

&lt;p style="line-height: 19px;"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;There are not many companies or organizations that can truly say they don’t need Cyber Insurance at a minimum. Many organizations are subject to further regulatory requirements (HIPAA, PCI DSS, CMMC, FTC Safeguards and others) that require not only the very basic Cybersecurity protections but also require further compliance with very specific controls to ensure the IT environment is always as secure as possible. Compliance can be very difficult, but the risk of non-compliance is huge, whereas non-compliance can put many companies out of business.&lt;/font&gt;&lt;/p&gt;

&lt;h5&gt;&lt;font face="Verdana" color="#4D5758" style="font-size: 18px;"&gt;About the Author&lt;/font&gt;&lt;/h5&gt;

&lt;p style="line-height: 19px;"&gt;&lt;font face="Verdana" style="font-size: 12px;"&gt;&lt;em style=""&gt;Barry Hassler is the founder and President of Hassler Communication Systems Technology, Inc (HCST), a business IT Managed Services Provider based in Beavercreek OH. HCST serves the greater Dayton and Springfield Ohio area (and beyond), specializing in managed IT services, Cybersecurity and risk management, Microsoft 365 cloud services, backup solutions and disaster recovery, and Voice-over-IP (VoIP) telecommunications. Barry is a certified compliance consultant.&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;

&lt;h5&gt;&lt;font color="#0F4761" face="Verdana" style="font-size: 27px;"&gt;References and Supplementary Materials&lt;/font&gt;&lt;span style=""&gt;&amp;nbsp;&lt;/span&gt;&lt;/h5&gt;

&lt;p style="line-height: 19px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;Hoffman, Zack. “Cyber Insurance Challenges: Why Premiums Are Rising, and Coverage Is Harder to Obtain | CyberMaxx.” CyberMaxx, 23 Oct. 2024, www.cybermaxx.com/resources/cyber-insurance-challenges-why-premiums-are-rising-and-coverage-is-harder-to-obtain.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 19px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;Scroxton, Alex. “Data Breach Class Action Costs Mount Up.” ComputerWeekly.com, 24 Apr. 2025, www.computerweekly.com/news/366622911/Data-breach-class-action-costs-mount-up.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 19px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;Palatty, Nivedita James. “64 Cyber Insurance Claims Statistics 2025.” Astra, 27 June 2025, https://www.getastra.com/blog/security-audit/cyber-insurance-claims-statistics/.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 19px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;Palatty, Nivedita James. “81 Phishing Attack Statistics 2025: The Ultimate Insight.” Astra, 19 August 2025, https://www.getastra.com/blog/security-audit/phishing-attack-statistics/.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 19px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;Bonnie, Emily. “110+ of the Latest Data Breach Statistics [Updated 2025].” Secureframe, 3 January 2025, https://secureframe.com/blog/data-breach-statistics.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 19px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;Spys, Denys. “Phishing Statistics in 2025: The Ultimate Insight | TechMagic.” Blog | TechMagic, 4 Aug. 2025, www.techmagic.co/blog/blog-phishing-attack-statistics.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 19px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;Alder, Steve. “Kettering Health Resumes Normal Operations for Key Services Following Ransomware Attack.” HIPAA Journal, 13 June 2025, www.hipaajournal.com/kettering-health-ransomware-attack.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 19px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;Bruce, Giles. “Kettering Health Says Data Breached in Ransomware&lt;/font&gt; &lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;Attack.” Becker’s Hospital Review | Healthcare News &amp;amp; Analysis, 28 July 2025, www.beckershospitalreview.com/healthcare-information-technology/cybersecurity/kettering-health-says-data-breached-in-ransomware-attack.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 19px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;Keepnet Labs. “2025 Security Awareness Training Statistics.” Keepnet Labs, 23 July 2025, keepnetlabs.com/blog/security-awareness-training-statistics.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 19px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;Khalil, Mohammed. “Cyber Insurance Claims Statistics: Inside the Stats on Denials, Costs, and Coverage Gaps.” DeepStrike, 29 June 2025, deepstrike.io/blog/cyber-insurance-claims-statistics.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 19px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;Asaff, Kate. “Think You’Re Covered? 40% of Cyber Insurance Claims Say Otherwise.” Portnox, 23 May 2025, www.portnox.com/blog/compliance-regulations/think-youre-covered-40-of-cyber-insurance-claims-say-otherwise.&lt;/font&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13545150</link>
      <guid>https://www.technologyfirst.org/Tech-News/13545150</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Wed, 20 Aug 2025 14:33:46 GMT</pubDate>
      <title>3 Steps to Improve your Software Productivity AND Work-Life Balance</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Newsletter/2025/Jeff%20Van%20Fleet%20blog%20September%202025.png" alt="" title="" border="0"&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Software leaders face immense pressure. You’re expected to deliver high-quality products under tight deadlines, all while managing costs and keeping your team from burning out. Bugs, missed deadlines, scope creep, and unrealistic demands are often seen as part of the job.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;If this sounds familiar, you’re not alone. In a recent Lighthouse Technologies survey of 110 software leaders, &lt;strong&gt;27% reported experiencing burnout&lt;/strong&gt;—a direct result of constant rework, late nights, and endless firefighting.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;" align="center"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Newsletter/2025/Jeff%20Van%20Fleet.png" alt="" title="" border="0" width="328" height="186"&gt;&lt;br&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Many leaders accept this as the status quo, but it doesn’t have to be your reality. There is a better way! You can transform your team’s productivity and restore their work-life balance, allowing them to focus on what truly matters most—both at work &lt;em&gt;and&lt;/em&gt; at home. Sound too good to be true? Here are three steps to get started.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#01507A" face="Verdana" style="font-size: 16px;"&gt;&lt;strong&gt;&lt;font&gt;1.&lt;font&gt;&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/font&gt;&lt;/strong&gt; &lt;strong&gt;Stop Managing Symptoms. Start Uncovering Root Causes.&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Quality issues, missed schedules, and productivity challenges aren’t solved by throwing more people or hours at them; they’re solved by uncovering and addressing the root causes.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Consider a 250-person development team we worked with. They were five years into a two-year project—stuck in beta, drowning in open defects, and unable to release. Frustration was high for everyone, from customers to developers to executives.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Our initial Root Cause Analysis uncovered a shocking number of findings — 475 to be exact. One of the most critical? A high volume of overly complex code. Cyclomatic complexity, a measure of the number of unique paths through a piece of code, is a leading indicator of risk. Fragile code with high complexity is difficult to test, hard to maintain, and a breeding ground for bugs, and this complexity is a core reason that when a developer goes in to fix a bug or make an enhancement they likely break something that previously worked.&lt;/font&gt;&lt;/p&gt;

&lt;div style="margin-left: 2em"&gt;
  &lt;ul&gt;
    &lt;li&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;&lt;span style=""&gt;A code module with 10+ branches is considered fragile.&lt;/span&gt;&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;&lt;span style=""&gt;Modules with 51+ branches are considered untestable.&lt;/span&gt;&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;This client had 1,655 complex modules, representing 9.5% of their entire system. This wasn’t just a technical problem; it was a business problem.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Aptos, sans-serif"&gt;&lt;u&gt;&lt;font style="font-size: 15px;"&gt;&lt;font face="Verdana, sans-serif"&gt;ACTIONABLE INSIGHT:&lt;/font&gt;&lt;/font&gt;&lt;/u&gt; &lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Complex code = Fragile code.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Aptos, sans-serif"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Use tools like &lt;em&gt;SonarQube&lt;/em&gt; to regularly monitor cyclomatic complexity. A good goal is &lt;strong&gt;less than 1.5% of your software modules have complexity greater than 10&lt;/strong&gt;.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" color="#01507A" style="font-size: 16px;"&gt;&lt;strong&gt;2. Close the Defect Loop &amp;amp; Restore Confidence&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;The same team was discovering &lt;strong&gt;22.1 new defects per day&lt;/strong&gt;—but fixing only &lt;strong&gt;20.3 per day&lt;/strong&gt;. To make matters worse, their bad-fix rate was 25%, meaning every fourth “fix” broke something else.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;The result? An ever-growing backlog of bugs and sinking delivery confidence. This isn’t just about an overloaded team; it’s about a broken system that erodes customer trust, developer morale, and leadership’s confidence in their team.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Aptos, sans-serif" style="font-size: 16px;"&gt;&lt;u&gt;&lt;font face="Verdana, sans-serif"&gt;ACTIONABLE INSIGHT:&lt;/font&gt;&lt;/u&gt; &lt;font face="Verdana, sans-serif"&gt;Track your defect backlog and bad-fix rate over time. A high bad-fix percentage signals broken processes that need urgent attention—not just more testing.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" color="#01507A" style="font-size: 16px;"&gt;&lt;strong&gt;3. Establish clear release exit criteria&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Why does release readiness matter? We all want to know how well the software will work once it is released and how many issues our customers are likely to discover. Most companies simply plan 30 days of testing for major releases regardless of the number of defects being discovered. If you imagine that your team found 10 defects/day for the last 5 days, it’s bloody likely they will find 10 more defects on the 31&lt;sup&gt;st&lt;/sup&gt; day (if they are allowed to continue). To improve release readiness, we need to track and report on defect data so management can make informed release decisions.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;As an example, the below graph shows the team's predicted defects—worst case (blue), best case (green), and actual (black). By their scheduled release date (Feb 19 – the vertical, black dotted line), the team had discovered far fewer defects than expected. In fact, they had been discovering 5 defects/day for the past two weeks and the rate was steady. Additionally, they were approximately 100 defects short of the plan. Fewer bugs might sound good, but it’s often a red flag for insufficient testing.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;" align="center"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Newsletter/2025/Jeff%20Van%20Fleet%20V2.png" alt="" title="" border="0" width="455" height="279"&gt;&lt;br&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Without this data, the client would have released a bug-ridden product, leading to customer frustration and more firefighting. Instead, they used the data to justify pushing the release and empowering their team to get creative with testing (see the blue oval).&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;The result? They released a system their customers loved, and the team not only got to celebrate their first win in what felt like forever, but also reclaimed their nights and weekends.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Aptos, sans-serif" style="font-size: 16px;"&gt;&lt;u&gt;&lt;font face="Verdana, sans-serif"&gt;ACTIONABLE INSIGHT&lt;/font&gt;&lt;/u&gt;&lt;font face="Verdana, sans-serif"&gt;: Whether doing manual or automated testing, a tester’s job is not to execute test cases; &lt;strong&gt;it's to find unique defects&lt;/strong&gt;. Encourage your team to think creatively and critically. This will empower your team, improve company culture, and lead to better software!&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" color="#01507A" style="font-size: 16px;"&gt;&lt;strong&gt;You Can’t Manage What You Don’t Measure&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;This transformation didn’t happen by chance. It happened because the team stopped guessing and started measuring. By shining a light on the root causes—not just the symptoms—they were able to:&lt;/font&gt;&lt;/p&gt;

&lt;div style="margin-left: 2em"&gt;
  &lt;ul&gt;
    &lt;li style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;Resolve production issues&lt;/font&gt;&lt;/li&gt;

    &lt;li style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;Improve customer satisfaction&lt;/font&gt;&lt;/li&gt;

    &lt;li style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;Restore delivery confidence&lt;/font&gt;&lt;/li&gt;

    &lt;li style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;Finally breathe again&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;You don’t have to choose between delivering great software and protecting your team’s work-life balance. With the right data and processes, you can achieve both. That’s why at Lighthouse Technologies we live by the principle: you can’t manage what you don’t measure. If you’d like to improve your quality, schedule, productivity and work-life balance, &lt;a href="https://lighthousetechnologies.com/contact-us/"&gt;&lt;font&gt;let’s have a conversation&lt;/font&gt;&lt;/a&gt; and explore this together.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" color="#01507A" style="font-size: 16px;"&gt;&lt;strong&gt;Special Opportunity for Technology First Members&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Project managers know the triple constraints of quality, schedule, and cost are inextricably tied together. As we have helped software teams improve for the past twenty years, we realized that culture also plays a crucial role – the team must have psychological safety to raise issues and bring ideas forward. Our Software Performance Benchmark is designed to baseline your team’s current quality, schedule, cost, effort, and culture Key Performance Indicators (KPIs). From there, we baseline these KPIs against industry data to help you identify opportunities for improvement and chart a data-driven path forward to success. Remember – You can’t manage what you don’t measure.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font style="font-size: 16px;"&gt;&lt;font face="Verdana, sans-serif"&gt;The &lt;a href="https://lighthousetechnologies.com/software-benchmark/"&gt;&lt;font&gt;Software Performance Benchmark&lt;/font&gt;&lt;/a&gt; is normally only $10,000, but for Technology First members, we are offering it at a 50% discount. Not only that, if we don’t find at least a 20% improvement, it’s a full money-back guarantee. If you're ready to stop managing symptoms and start solving problems, reach out to us at&lt;/font&gt; &lt;font face="Verdana, sans-serif" color="#000000"&gt;&lt;a href="mailto:team@lighthousetechnologies.com"&gt;&lt;font color="#467886"&gt;team@lighthousetechnologies.com&lt;/font&gt;&lt;/a&gt;!&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 12px;"&gt;About the author:&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;font style="font-size: 12px;"&gt;After nearly two decades as a software developer and test engineer for the U.S. Air Force, where he built automated testing platforms and helped his team achieve CMM-3 certification, Jeff Van Fleet discovered his passion for transforming how software teams work. He founded Lighthouse Technologies to help organizations boost productivity, rescue struggling projects, and manage complex implementations through streamlined processes and agile practices. Outside of work, he enjoys hiking, baking bread, telling Dad jokes, and cheering for Penn State and the Pittsburgh Steelers—all while prioritizing balance as a husband and father.&lt;/font&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13533642</link>
      <guid>https://www.technologyfirst.org/Tech-News/13533642</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Thu, 14 Aug 2025 14:12:40 GMT</pubDate>
      <title>Workforce Development: Personal Attributes, Skills, and Competencies MUST Work Together</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/Dave%20Davis%20Blog%20September%202025.png" alt="" title="" border="0"&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 14px;"&gt;I am experienced in delivering value to companies via projects and programs.&amp;nbsp; This profession has led me to be extremely involved in the Project Management Institute (PMI) organization.&amp;nbsp; As the Co-Chairman of developing the PMI Business Analysis Practice Guide 2.0, I led a team charged with defining and refining how skills and competencies shape professional excellence. &amp;nbsp;I worked with an international team and led a lot of interesting discussions about roles and how the skills needed to perform were ever changing.&amp;nbsp; We ended up with a document that complements other PMI standards by providing detailed techniques that can be used in conjunction with broader project management frameworks.&amp;nbsp; This has led to several thoughtful discussions with like-mined professionals on “how do we develop the Workforce?” to meet ever changing environments to deliver value.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 14px;"&gt;But in applying those Business Analysis practices in real-world technology and business environments, I realized there was a missing piece. Skills and competencies — while critical — don’t fully explain why some professionals excel and others plateau. The difference often lies in personal attributes: the enduring qualities like adaptability, resilience, and integrity that influence how a person learns, applies, and sustains their capabilities.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font style="font-size: 14px;"&gt;&lt;font face="Verdana, sans-serif"&gt;The strength of an organization’s workforce is not built on skills alone. It’s the synergy between personal attributes, competencies, and technical and soft skills, all working within the framework of a strong corporate culture, which drives lasting success.&amp;nbsp; If you want to develop a w&lt;/font&gt;&lt;font face="Verdana, sans-serif"&gt;orkforce, you must foster an environment that thrives on personal growth.&amp;nbsp;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;h2 style="line-height: 20px;"&gt;&lt;font face="Verdana, sans-serif" color="#4F81BD" style="font-size: 17px;"&gt;&lt;strong&gt;Understanding the Three Building Blocks&lt;/strong&gt;&lt;/font&gt;&lt;/h2&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Cambria, serif" style="font-size: 14px;"&gt;&lt;font face="Verdana, sans-serif"&gt;Figure 1 Building Blocks&lt;/font&gt; &lt;font face="Verdana, sans-serif"&gt;Illustrates the relationship between Individual skills, competencies, and personal attributes.&amp;nbsp; The center of this relationship is the corporate culture.&amp;nbsp; If you do not live daily value of personal growth and workforce development.&amp;nbsp; We can break down these building blocks into 3 categories.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" color="#01507A" style="font-size: 12px;"&gt;&lt;em&gt;Figure 1 Building Blocks&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif"&gt;&amp;nbsp;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/Dave%20Davis%20Blog.png" alt="" title="" border="0" width="177" height="160"&gt;&lt;br&gt;
&lt;font style="font-size: 16px;"&gt;&lt;em&gt;1. Skills – The Practical Abilities&lt;/em&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 14px;"&gt;Skills are the specific, teachable abilities that can be measured and improved. They can be technical (e.g., cloud architecture, data analytics) or soft (e.g., negotiation, presentation skills). While essential, skills alone don’t ensure role success — they need to be applied within the right context.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 14px;"&gt;This is the basis for a change management skills gap analysis exercise.&amp;nbsp; It can include technical skills, people skills, and business acumen.&amp;nbsp; Acquiring literacy of an external domain (such as AI) may also represent an opportunity for workforce development.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;&lt;em&gt;2. Competencies – The Integrated Capabilities&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 14px;"&gt;Competencies are broader than skills, combining knowledge, technical ability, and behaviors. For example, the competency of cybersecurity leadership includes threat analysis, incident response, communication under pressure, and ethical judgment. Competencies reflect not just what someone can do, but how they consistently perform.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 14px;"&gt;This is an area where roles don’t matter, but the functions do.&amp;nbsp; For example, a person may be assigned a role as a project manager but performs a lot of business analysis in defining the project “definition of done”.&amp;nbsp; Sending the person to training on business analysis will help their overall competencies as a change agent for the organization.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;3&lt;em&gt;. Personal Attributes – Human Foundatio&lt;/em&gt;&lt;/font&gt;&lt;font face="Verdana, sans-serif" style="font-size: 15px;"&gt;&lt;em&gt;n&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 14px;"&gt;Attributes such as resilience, curiosity, empathy, and integrity influence how individuals approach challenges, adapt to change, and engage with others. These traits are often more difficult to teach, but they determine how effectively a person develops and applies both skills and competencies.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 14px;"&gt;This is an individual trait, and you cannot teach it or force it on an individual.&amp;nbsp; What you can do is encourage it.&amp;nbsp; Critical attributes in workforce development might include individual commitment to personal and professional growth, curiosity, and relating something that seem extraneous to their personal sphere of influence.&lt;/font&gt;&lt;/p&gt;

&lt;h2 style="line-height: 20px;"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/Dave%20Davis%20blog%20image%202.png" alt="" title="" border="0" width="341" height="742"&gt;&lt;br&gt;&lt;/h2&gt;

&lt;h2 style="line-height: 20px;"&gt;&lt;font face="Verdana, sans-serif" color="#4F81BD" style="font-size: 16px;"&gt;&lt;strong&gt;The Corporate Culture Connection&lt;/strong&gt;&lt;/font&gt;&lt;/h2&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" style="font-size: 14px;"&gt;Corporate culture shapes — and is shaped by — the way these three elements interact.&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

&lt;div style="margin-left: 2em"&gt;
  &lt;ul&gt;
    &lt;li&gt;&lt;font face="Verdana, sans-serif" style="font-size: 14px;"&gt;&lt;font face="Verdana, sans-serif"&gt;A culture of continuous learning encourages employees to develop new skills regularly.&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Verdana, sans-serif" style="font-size: 14px;"&gt;&lt;span&gt;A collaborative culture fosters competencies like teamwork and cross-functional problem-solving.&lt;/span&gt;&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Verdana, sans-serif" style="font-size: 14px;"&gt;&lt;span&gt;A values-driven culture reinforces personal attributes such as trustworthiness and accountability.&lt;/span&gt;&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif"&gt;&lt;font style="font-size: 14px;"&gt;When culture and development are aligned, organizations create a self-reinforcing cycle: employees gain the capabilities they need, apply them effectively, and model behaviors that strengthen the culture for the next generation of talent.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;h2 style="line-height: 20px;"&gt;&lt;font face="Verdana, sans-serif" color="#4F81BD" style="font-size: 16px;"&gt;&lt;strong&gt;Why It Matters for Workforce Development&lt;/strong&gt;&lt;/font&gt;&lt;/h2&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 14px;"&gt;Workforce development is important for evolving your team to meet challenges in the workplace.&amp;nbsp; Investing in the team, both formally and informally, is an intangible benefit.&amp;nbsp; While pursing a production issue, the team feels free to relate previous like experiences can generate a story that illustrates the problem better than volumes of technical documentation and YouTube video.&amp;nbsp; Some of these intangible benefits include:&lt;/font&gt;&lt;/p&gt;

&lt;div style="margin-left: 2em"&gt;
  &lt;ul&gt;
    &lt;li&gt;&lt;span&gt;&lt;font style="font-size: 14px;"&gt;Higher retention due to stronger employee engagement.&lt;/font&gt;&lt;/span&gt;&lt;/li&gt;

    &lt;li&gt;&lt;span&gt;&lt;font style="font-size: 14px;"&gt;Better adaptability to new technologies and market shifts.&lt;/font&gt;&lt;/span&gt;&lt;/li&gt;

    &lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;font style="font-size: 14px;"&gt;More effective leadership pipelines with candidates ready to step into critical roles.&lt;/font&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;&lt;span&gt;&lt;font style="font-size: 14px;"&gt;This holistic approach turns workforce development into a strategic advantage rather than a reactive necessity.&lt;/font&gt;&lt;/span&gt;&lt;br&gt;

&lt;h2 style="line-height: 20px;"&gt;&lt;font face="Verdana, sans-serif" color="#4F81BD" style="font-size: 16px;"&gt;&lt;strong&gt;Practical Steps for Leaders&lt;/strong&gt;&lt;/font&gt;&lt;/h2&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 14px;"&gt;Steps for your workforce development really need to be a conscious sustainable activity.&amp;nbsp; It’s not just putting together bullet points in January to sit on a shelf gathering dust until the next January when you dust them off and change a few words and you’re good to go.&amp;nbsp; And it doesn’t have to involve an elaborate HR campaign.&amp;nbsp; I recommend you work with each member of the team and fill out a simple 4-quadrant card.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 14px;"&gt;Review this quarterly, or maybe even monthly.&amp;nbsp; This is not a career pathing exercise, it is a personal growth exercise.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 14px;"&gt;Many corporations punt on growth by telling individuals you are in charge of your career and we won’t give you a career path.&amp;nbsp; This approach to workforce development is how to grow yourself.&amp;nbsp; And to you nay-sayers that argue “if we develop them, they might quit and go to another company”.&amp;nbsp; That is a risk, but they may do that to go to another company because they don’t feel valued due to lack of development.&lt;/font&gt;&lt;/p&gt;

&lt;h2 style="line-height: 20px;"&gt;&lt;font face="Verdana, sans-serif" color="#4F81BD" style="font-size: 16px;"&gt;&lt;strong&gt;The End Goal&lt;/strong&gt;&lt;/font&gt;&lt;/h2&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 14px;"&gt;My journey from writing about skills and competencies in the PMI Business Analysis Practice Guide 2.0 to exploring their interplay with personal attributes reinforced a vital truth: technical excellence alone isn’t enough.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 14px;"&gt;You can be taught technical tools and various business processes, but to develop the workforce, you need to develop a corporate culture that considers skills, competencies, and personal attributes.&amp;nbsp; Not consider workforce development but as an investment.&amp;nbsp; AI can’t replace personal attributes of curiosity and telling a story of an experience to clarify a situation.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 14px;"&gt;The real magic happens when an organization intentionally aligns skills, competencies, and personal attributes within a culture that values and develops all three. That’s where capability meets commitment — and where organizations create lasting impact.&amp;nbsp; To quote the Ohio State Football Legend Woody Hayes, “You Win with People”.&amp;nbsp; Your organization needs that perspective when it comes to Workforce development.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style="background-color: rgb(255, 255, 255);"&gt;&lt;font face="Rubik" style="font-size: 12px;"&gt;About the author:&amp;nbsp; David Davis is a r&lt;/font&gt;&lt;/span&gt;&lt;font style="font-size: 12px;"&gt;ecognized thought leader and seasoned Program/Project Manager with over 20 years’ experience leading large-scale business transformation, process improvement, and change management initiatives. He is skilled at bridging strategy and execution, fostering stakeholder trust, and driving measurable benefits through disciplined agile practices, benefits realization, and cross-functional collaboration.&lt;/font&gt;&lt;/p&gt;&lt;br&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13531772</link>
      <guid>https://www.technologyfirst.org/Tech-News/13531772</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Fri, 01 Aug 2025 19:05:31 GMT</pubDate>
      <title>VMWare | Broadcom: What you need to Know</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/Seth%20Marsh%20Blog%20August%202025.png" alt="" title="" border="0"&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li style="list-style: none; display: inline"&gt;
    &lt;p style="line-height: 18px;"&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;There’s lots of “noise” about this newest and latest change to the program… the 2&lt;sup style=""&gt;nd&lt;/sup&gt; in 18 months… so lots to unpack……&lt;/font&gt;&lt;/p&gt;

    &lt;p style="line-height: 18px;"&gt;&lt;font face="Aptos, sans-serif" color="#01507A" style="font-size: 16px;"&gt;&lt;strong style=""&gt;&lt;em style=""&gt;1. Potential Service Disruption&lt;/em&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;p style="line-height: 18px;"&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;Many smaller VMware Cloud Services Providers (VCSPs) are being removed from the program unless directly invited by Broadcom.&lt;/font&gt;&lt;/p&gt;

    &lt;p style="line-height: 18px;"&gt;&lt;font face="Aptos, sans-serif" style="font-size: 16px;"&gt;&lt;font face="Rubik"&gt;Only 14 providers in the U.S. remain in the program.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;p style="line-height: 18px;"&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;If your current provider wasn’t invited, they can’t renew or extend contracts after October 31, 2025. If you are still in contract, then you are fine until the contract expiration… then the statement above takes effect.&lt;/font&gt;&lt;/p&gt;

    &lt;p&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;Depending on your renewal date, this could result in an urgent need to migrate or risk service termination if you're with an unapproved provider.&lt;/font&gt;&lt;/p&gt;

    &lt;p style="line-height: 18px;"&gt;&lt;font face="Aptos, sans-serif" color="#01507A" style="font-size: 16px;"&gt;&lt;strong style=""&gt;&lt;em style=""&gt;2. Increased Costs&lt;/em&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;p style="line-height: 18px;"&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;Broadcom has already made major pricing changes this year.&lt;/font&gt;&lt;/p&gt;

    &lt;div style="margin-left: 2em"&gt;
      &lt;ul&gt;
        &lt;li&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;Minimum core purchases jumped from 16 to 96&lt;/font&gt;&lt;/li&gt;

        &lt;li&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;Late renewals now face a 20% penalty&lt;/font&gt;&lt;/li&gt;
      &lt;/ul&gt;
    &lt;/div&gt;

    &lt;p style="line-height: 18px;"&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;Customers may now be forced to switch to larger, authorized partners, who may charge higher prices or minimum commitments that smaller users can't justify.&lt;/font&gt;&lt;/p&gt;

    &lt;p style="line-height: 18px;"&gt;&lt;font face="Aptos, sans-serif" color="#01507A" style="font-size: 16px;"&gt;&lt;strong style=""&gt;&lt;em style=""&gt;3. Forced Migrations or Consolidation&lt;/em&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;p style="line-height: 18px;"&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;If your provider is no longer supported, you may need to:&lt;/font&gt;&lt;/p&gt;

    &lt;div style="margin-left: 2em"&gt;
      &lt;ul&gt;
        &lt;li&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;Migrate to an authorized VCSP,&lt;/font&gt;&lt;/li&gt;

        &lt;li&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;Rebuild parts of your environment if white-labeled services were used (these end Oct. 31),&lt;/font&gt;&lt;/li&gt;

        &lt;li&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;Switch platforms, such as:&lt;/font&gt;&lt;/li&gt;

        &lt;li style="list-style: none; display: inline"&gt;
          &lt;div style="margin-left: 2em"&gt;
            &lt;ol&gt;
              &lt;li&gt;&lt;span style=""&gt;&lt;font style="font-size: 16px;"&gt;Hyperscalers: Azure, AWS, GCP&lt;/font&gt;&lt;/span&gt;&lt;/li&gt;

              &lt;li&gt;&lt;font style="font-size: 16px;"&gt;Alternatives: Nutanix, OpenStack, KVM&lt;/font&gt;&lt;/li&gt;
            &lt;/ol&gt;
          &lt;/div&gt;
        &lt;/li&gt;
      &lt;/ul&gt;
    &lt;/div&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;span style=""&gt;&lt;font style="font-size: 16px;"&gt;Each of these paths carries operational risk, potential downtime, and cost.&lt;/font&gt;&lt;/span&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
  &lt;li style="list-style: none; display: inline"&gt;
    &lt;p&gt;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li style="list-style: none; display: inline"&gt;
    &lt;p style="line-height: 18px;"&gt;&lt;font face="Aptos, sans-serif" color="#01507A" style="font-size: 16px;"&gt;&lt;strong style=""&gt;&lt;em style=""&gt;4. Loss of Trusted Relationships&lt;/em&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;p style="line-height: 18px;"&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;Many customers built long-term relationships with regional or boutique partners who offered:&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li style="list-style: none; display: inline"&gt;
    &lt;div style="margin-left: 2em"&gt;
      &lt;ul&gt;
        &lt;li&gt;&lt;font face="Rubik"&gt;Custom support&lt;/font&gt;&lt;/li&gt;

        &lt;li&gt;&lt;font face="Rubik"&gt;Flexible pricing&lt;/font&gt;&lt;/li&gt;

        &lt;li&gt;&lt;font face="Rubik"&gt;Tailored cloud environments&lt;/font&gt;&lt;/li&gt;
      &lt;/ul&gt;
    &lt;/div&gt;
  &lt;/li&gt;

  &lt;li style="list-style: none; display: inline"&gt;
    &lt;p&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;Now, many of those partners are excluded from the VMware ecosystem—leaving clients scrambling for alternatives.&lt;/font&gt;&lt;/p&gt;

    &lt;p style="line-height: 18px;"&gt;&lt;font face="Aptos, sans-serif" color="#01507A" style="font-size: 16px;"&gt;&lt;strong style=""&gt;&lt;em style=""&gt;&amp;nbsp;5. Confusion &amp;amp; Uncertainty&lt;/em&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;p style="line-height: 18px;"&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;Broadcom has made several changes in rapid succession (product packaging, licensing, now partners).&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li style="list-style: none; display: inline"&gt;
    &lt;div style="margin-left: 2em"&gt;
      &lt;ul&gt;
        &lt;li&gt;&lt;font face="Rubik"&gt;Customers are struggling to keep up and are unsure:&lt;/font&gt;&lt;/li&gt;

        &lt;li&gt;&lt;font face="Rubik"&gt;Who their provider reports to now&lt;/font&gt;&lt;/li&gt;

        &lt;li&gt;&lt;font face="Rubik"&gt;What future pricing or support looks like&lt;/font&gt;&lt;/li&gt;

        &lt;li&gt;&lt;font face="Rubik"&gt;Whether staying on VMware is sustainable&lt;/font&gt;&lt;/li&gt;
      &lt;/ul&gt;
    &lt;/div&gt;
  &lt;/li&gt;

  &lt;li style="list-style: none; display: inline"&gt;
    &lt;p style="line-height: 18px;"&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;&lt;font color="#000000"&gt;&amp;nbsp;&lt;/font&gt;&lt;br&gt;
    &lt;strong style=""&gt;&lt;em style=""&gt;&lt;font color="#01507A"&gt;In Summary:&lt;/font&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;p style="line-height: 18px;"&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;If you're a VMware user, especially through a small or regional partner—you may be impacted by:&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li style="list-style: none; display: inline"&gt;
    &lt;div style="margin-left: 2em"&gt;
      &lt;ul&gt;
        &lt;li&gt;&lt;font face="Rubik"&gt;Contract expiration with no renewal option&lt;/font&gt;&lt;/li&gt;

        &lt;li&gt;&lt;font face="Rubik"&gt;Rising licensing and support costs&lt;/font&gt;&lt;/li&gt;

        &lt;li&gt;&lt;font face="Rubik"&gt;Migration headaches&lt;/font&gt;&lt;/li&gt;

        &lt;li&gt;&lt;font face="Rubik"&gt;The need to quickly find a new, approved provider&lt;/font&gt;&lt;/li&gt;
      &lt;/ul&gt;
    &lt;/div&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Aptos, sans-serif" color="#01507A" style="font-size: 16px;"&gt;&lt;strong style=""&gt;&lt;em style=""&gt;Next Steps:&lt;/em&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;Work with a trusted partner to understand ALL your options to start planning a transition or evaluating alternatives before October 31, 2025.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 18px;"&gt;&lt;font face="Rubik" color="#000000" style="font-size: 16px;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" color="#000000" style="font-size: 13px;"&gt;About the author: Seth Marsh brings over 30 years of hands-on IT industry experience, having lived through transformative eras—from the rise of mobile and cloud to the evolution of the OPEX model. His well-rounded background spans the full spectrum of tech sales, including leadership roles at a global security provider, VAR and manufacturer representation, and direct sales—giving him rare insight into every side of the channel.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13527393</link>
      <guid>https://www.technologyfirst.org/Tech-News/13527393</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Fri, 11 Jul 2025 15:49:17 GMT</pubDate>
      <title>Myth vs. Reality: Bridging Ohio’s Tech Talent Gap with International STEM Graduates</title>
      <description>&lt;p align="left"&gt;&lt;strong&gt;&lt;u&gt;&lt;font face="Rubik"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/Dr.%20Daniel%20A.%20Asamoah%20Blog%20August%202025.png" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/font&gt;&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;In Ohio’s evolving tech landscape, organizations face a common and growing challenge: finding and retaining skilled STEM talent. STEM represents fields in Science, Technology, Engineering and Mathematics. Disciplines within these fields are varied and may include jobs in management information systems (MIS), artificial intelligence (AI), cybersecurity, analytics, supply chain management (SCM), economics, computer science, and engineering.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;Ohio employers can overcome this talent-gap hurdle by critically considering a rich and readily available talent pool among international students from local universities with STEM degrees. Employers’ hesitation usually emanates from concerns about visa limitations or perceived short-term employment windows. However, as someone who works closely with these students, I’ll dispel these myths and explain their long-term value.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font face="Rubik" color="#01507A"&gt;The Facts: Nearly Four Years of Work Eligibility Without H-1B Sponsorship&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;At Wright State University for instance, we graduate several international students each year from our STEM-designated programs and currently have over 1,000 graduates on Optional Practical Training (OPT). These students are not just academically strong; they are fluent in global business practices, technologically skilled, and eager to contribute to the state’s economy.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;More importantly, they are legally eligible to work in the U.S. for nearly four years after enrollment without needing an H-1B visa initially. Here’s how:&lt;/font&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;font face="Rubik"&gt;Curricular Practical Training (CPT) allows students to intern with local businesses in the Miami Valley region prior to graduation for up to 12 months.&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Rubik"&gt;Optional Practical Training (OPT) provides 12 months of full-time work authorization post-graduation.&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Rubik"&gt;STEM OPT Extension grants an additional 24 months to graduates of STEM-designated programs like MIS.&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;That adds up to three years of full-time post-graduation work, plus internship time during their degree. All of this can be managed without H-1B sponsorship, a key point many employers overlook.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font face="Rubik" color="#01507A"&gt;Local Talent, Global Perspective&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;These students are already here in Ohio and live in our communities. They study and work under the guidance of faculty and staff committed to equipping them with cutting-edge, career-ready skills. I’ve watched these students excel in hands-on analytics projects, design complex systems, and solve real-world problems through internships and capstones with local companies.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;Also, they bring onboard a global mindset, linguistic diversity, and cross-cultural competency. These are qualities that are increasingly vital as Ohio’s businesses expand into new markets and serve increasingly diverse customer bases.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font face="Rubik" color="#01507A"&gt;Myth-Busting 1: “Are there jobs in Southwest Ohio for International Students”?&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;A common misconception in southwest Ohio is that job opportunities, especially for international students are limited to government-related work at the Wright-Patterson Air Force Base, which typically requires only U.S. citizenship. However, this region is home to a growing number of private sector employers in IT, biotech, manufacturing, logistics, and healthcare, many of whom actively seek skilled talent regardless of nationality. Startups, mid-sized companies, and global firms across the Miami Valley region could benefit from international graduates’ talents. International students on STEM OPT are eligible to work for most private sector employers, provided the role is related to their field of study.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font face="Rubik" color="#01507A"&gt;Myth-Busting 2: "But They’ll Leave Soon, Right?"&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;This is perhaps the most common misconception I encounter in conversations with Ohio business leaders: the belief that international students are only a temporary solution because of visa expiration or immigration hurdles.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;Here’s the reality: most young professionals regardless of nationality change jobs every 2 to 4 years. According to the U.S. Bureau of Labor Statistics, the median tenure for employees aged 25 to 34 is under three years. Hence, even if an international graduate works for your organization during their full OPT period and then moves on, you are still receiving a better-than-average, return on investment. Furthermore, international students often demonstrate greater loyalty to companies that give them their first professional opportunity, especially in regions like Ohio, where the tech community is tight-knit and supportive.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font face="Rubik" color="#01507A"&gt;Myth Busting 3: “Should I Sponsor visa immediately after hiring”&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;Many small and medium-sized organizations worry that hiring international graduates means immediately navigating the complexities of visa sponsorship. This is not the case. With up to three years of STEM OPT, you have ample time to assess an employee’s fit and performance. During that period, if you decide that the individual is indispensable, you can choose to sponsor them for an H-1B visa or green card. The most important insight is that that decision does not need to be made on day one or soon after hiring.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;This “hire first, sponsor later if needed” approach gives Ohio companies flexibility and minimizes risk.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font face="Rubik"&gt;&lt;font color="#01507A"&gt;Why This Matters for Ohio’s Economic Growt&lt;/font&gt;h&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;As Ohio continues to attract major investments in manufacturing, semiconductors, IT services, and logistics, the demand for specialized talent will only intensify. Companies like Intel are already transforming the employment landscape, and that ripple effect will be felt across the state.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;Hiring international graduates from local institutions offers a homegrown solution to national workforce shortages. These students are trained here, adapted to Ohio work and social culture, and eager to stay and contribute. They represent a ready-to-deploy workforce that understands both global dynamics and local needs.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font face="Rubik" color="#01507A"&gt;Practical Steps for Employers&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;font face="Rubik"&gt;Contact University Career Centers: Ohio universities have dedicated units such as Wright State’s Career Hub that assists employers with hiring students and understanding CPT/OPT processes.&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Rubik"&gt;Launch Internships via CPT: Hosting a student during their academic program gives you a no-pressure trial run and introduces your organization to emerging talent.&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Rubik"&gt;Educate Your HR Teams: Ensure recruiters and hiring managers are familiar with the work authorization options available to STEM students through CPT and OPT.&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;&lt;font face="Rubik" color="#01507A"&gt;Final Thoughts: It’s a win-win for Ohio&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;Your company’s next data scientist, AI expert, or cybersecurity specialist, may already be in a classroom at your local university, learning, contributing, and ready to prove themselves.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;Ohio educates thousands of brilliant international students each year, yet many leave the state after graduation for opportunities in tech hubs like California, North Carolina, and Texas. If we want to grow Ohio’s economy and compete nationally, we must work to retain this talent.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;Hiring international graduates isn’t about replacing domestic workers. It’s about complementing the workforce and filling urgent skill gaps. These students bring innovation, drive, and a global mindset to local companies. Let’s give them a chance to help build Ohio!&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 12px;"&gt;About the author:&amp;nbsp;&lt;span style="background-color: rgb(255, 255, 255);"&gt;&lt;font&gt;Dr. Daniel Asamoah is the Chair and Professor of the School of Finance, Accountancy, MIS, and Economics at Wright State University. An expert in business analytics, big data applications, decision support systems in healthcare, and operations management, Dr. Asamoah has spoken at numerous conferences, including the annual meetings of the Decision Sciences Institute. His research has been featured in various prestigious journals, such as Decision Support Systems and Simulation.&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13519814</link>
      <guid>https://www.technologyfirst.org/Tech-News/13519814</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Sun, 01 Jun 2025 12:42:30 GMT</pubDate>
      <title>Community Is Everything</title>
      <description>&lt;p&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Newsletter/Melissa%20Cutcher%20Blog%20June%202025.png" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;As we step into summer, I’ve been reflecting on a simple, yet powerful truth: &lt;em&gt;community is everything&lt;/em&gt;. Especially in technology—an industry that moves fast and transforms faster—being part of something bigger than ourselves is what keeps us not just informed but inspired.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;&lt;strong&gt;Who are we?&lt;/strong&gt;&lt;br&gt;
We’re &lt;a href="https://technologyfirst.org/" target="_blank"&gt;Technology First&lt;/a&gt;. A collective of professionals, innovators, educators, and leaders who believe that tech is not just about tools—it’s about people. We are the minds behind the solutions, the hands that build systems, and the hearts that understand how deeply technology shapes lives.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;&lt;strong&gt;What do we do?&lt;/strong&gt;&lt;br&gt;
We connect. We share. We learn. Whether it's through our &lt;a href="https://technologyfirst.org/Events" target="_blank"&gt;events&lt;/a&gt;, &lt;a href="https://technologyfirst.org/Emerging-Leaders-Program" target="_blank"&gt;professional development programs&lt;/a&gt;, &lt;a href="https://technologyfirst.org/Peer-Groups" target="_blank"&gt;peer groups&lt;/a&gt;, or just the everyday conversations that happen between members, we create a space where ideas thrive, and careers grow. We support each other, we celebrate each other, and yes—we challenge each other to lead with courage and curiosity.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;We're proud to play a part in moving the Dayton region’s technology community forward—helping organizations and individuals alike navigate change, spark innovation, and build a more connected future.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;&lt;strong&gt;Why does it matter?&lt;/strong&gt;&lt;br&gt;
Because in this digital age, no one should have to navigate the complexities of technology alone. Whether you're a seasoned leader or just starting out, there is a place for you here. A place to ask bold questions. A place to find answers. A place to belong.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;So, if you've ever found yourself wondering—&lt;em&gt;How do I get more involved? How do I find my people in tech? —&lt;/em&gt;you're in the right place. Come to an &lt;a href="https://technologyfirst.org/Technology-First-Events" target="_blank"&gt;event&lt;/a&gt;. Join a &lt;a href="https://technologyfirst.org/Peer-Groups" target="_blank"&gt;peer group&lt;/a&gt;. &lt;a href="https://technologyfirst.org/get-involved" target="_blank"&gt;Volunteer&lt;/a&gt;. Reach out. There’s room at the table, and your voice matters.&lt;/font&gt;&lt;/p&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;&lt;font&gt;Together, we’re not just advancing technology—we’re shaping the future of our region, one connection at a time.&lt;/font&gt;&lt;/font&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13504358</link>
      <guid>https://www.technologyfirst.org/Tech-News/13504358</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Thu, 01 May 2025 13:32:43 GMT</pubDate>
      <title>Empowering the Future: My Journey as a Volunteer with Technology First</title>
      <description>&lt;p&gt;&lt;font style="font-size: 16px;"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Newsletter/Zhali%20Meija%20Blog%20May%202025.png" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;In the energetic and ever-evolving world of technology, the importance of community cannot be overstated. As a professional in the tech industry, I have always believed in the power of collaboration and support. This belief has driven my commitment to volunteer with Technology First, an organization dedicated to connecting, strengthening, and championing the tech community in the Dayton region.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;Over past few years, I have had the honor of participating and volunteering at several conferences hosted by Technology First, including:&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;&lt;strong&gt;Ohio Information Security Conference (OISC) –&lt;/strong&gt; A gathering of security professionals, analysts, and IT leaders discuss emerging threats, risk mitigation and compliance. A community that addresses security urgency head on.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;&lt;strong&gt;Taste of IT –&lt;/strong&gt; An energetic conference highlighting tech trends, innovations, and strategic insights. With multiple sessions that span everything from cloud computing to leadership development, it’s a place where innovation meets opportunity.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;&lt;strong&gt;Dayton AI Day –&lt;/strong&gt; Launched in 2025, Dayton AI Day looks into the future: artificial intelligence, machine learning, and data-driven transformation.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;Volunteering at these events gave me the opportunity to explore sessions I might never attend otherwise. It’s been an experience that strengthens my technical insight and interpersonal communication.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;The sense of belonging I’ve found through Technology First has provided me with a profound sense of empowerment. As tech professionals, we often find ourselves focused on our specific roles and department. But through this organization, I’ve connected with a diverse network of individuals who share a common goal: to advance technology. This commitment to education and access aligns with my belief that knowledge is power.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;&lt;strong&gt;Networking and Collaboration&lt;/strong&gt; Networking is a vital aspect of professional development, and Technology First excels in building these connections. It is a platform for attendees to engage in meaningful conversations, share their experiences, and explore potential partnerships. As a volunteer, I had the chance to facilitate introductions and witness latest ideas and collaborations. Connections that often lead to mentorship and career opportunities.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;&lt;strong&gt;Continuous Learning and Growth&lt;/strong&gt; Volunteering is not just about giving back; it’s also about personal and professional growth. Each event offers me a chance to learn about the latest innovations and challenges shaping the tech industry today. I continue to broaden my perspective and deepen my commitment to staying informed and adaptable.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;&lt;strong&gt;Diversity and Inclusion&lt;/strong&gt; are more than buzzwords; they are essential for innovation and resilience in technology. Technology First actively promotes these values, and my participation in events hosted by Technology First’s Women 4 Technology Peer Group has deepened my understanding of their importance. By volunteering, I help foster a more inclusive environment where everyone, regardless of gender, background, or identity, has the opportunity to thrive in technology.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;My journey as a volunteer with Technology First has been deeply fulfilling. It has reinforced my belief in the power of community, education, and collaboration. By investing my time in this organization, I am not only supporting the growth of the technology in Dayton, but also helping others recognize their potential. I encourage my fellow tech professionals to consider volunteering. Together, we can create a vibrant and inclusive technology community that champions innovation and success.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;&lt;strong&gt;Zhali Mejia&lt;/strong&gt; is a GRC Analyst at CareSource with extensive experience in cyber risk management. Passionate about technology and community engagement, Zhali blends technical insight with a people-first approach to strengthen the organization's security posture. With a commitment to fostering collaboration and understanding among stakeholders, Zhali ensures that security measures are effectively communicated and implemented across all levels of the organization.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13494461</link>
      <guid>https://www.technologyfirst.org/Tech-News/13494461</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Thu, 01 May 2025 13:26:21 GMT</pubDate>
      <title>Protect Your Technology Investment</title>
      <description>&lt;p&gt;&lt;font style="font-size: 16px;"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Newsletter/Brian%20Henn%20Blog%20May%202025.png" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;Over the past two decades in the IT world, holding various positions from programmer to IT leader, one constant has been the unrelenting pace of change. According to McKinsey, over 50% of organizations have now adopted AI in at least one business unit, and that number continues to climb each year. The recent resurgence of AI in the past few years has only accelerated this trend, bringing both promise and confusion.&amp;nbsp; Amid the noise it can be difficult to know where to start and easy to get distracted by the latest “shiny object”. &amp;nbsp;&amp;nbsp;This is why taking an outcomes-based approach to AI and technology adoption is more important than ever. Aligning your investments with clear business objectives not only drives meaningful value but also ensures you’re working with the right partners and tools to protect your long-term technology investment.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 16px;"&gt;Ramifications of Poorly Planned Tech Investments&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;Most organizations fixate on upfront costs such as licensing and implementation but also try to force solutions using tools they’ve already invested in, even when those tools are likely not the right fit. This mindset often leads to misalignment with business strategy, low user adoption and growing technical debt.&amp;nbsp; According to a Boston Consulting Group study, &lt;strong&gt;70% of digital transformation efforts fail to meet their stated objectives&lt;/strong&gt;&lt;strong&gt;,&lt;/strong&gt; often due to poor planning, lack of alignment, or underestimating the complexity of integrating new capabilities into outdated environments. We’ve seen platforms deployed without clear ownership, analytics tools that go unused because no one trusts the data, and entire initiatives stalled due to poor change management. These hidden costs don’t show up on day on, however they compound quickly. Protecting your investment means thinking beyond delivery day and building with the end in mind and ensuring your teams are equipped to evolve with the tools that they use.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 16px;"&gt;Data Analytics – Harnessing the Power&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;Data Analytics and subsequent AI enablement is both a foundational capability and a force multiplier for any technology investment.&amp;nbsp; Yet too often, it’s treated as an afterthought, something to “get to later” once systems are live. That approach leaves organizations with fragmented insights and missed opportunities. In my experiences, companies that emphasize that data must be intentionally designed around business outcomes from the start are always the most successful.&amp;nbsp; This includes things like building scalable pipelines, establishing clear ownership, creating a culture of data literacy and fluency, and ensuring that the data is usable by those who need it.&amp;nbsp; A mature analytics approach doesn’t just support reporting, it fuels agility, drives innovation and turns platforms like AI or cloud infrastructure into truly strategic assets. Protecting your investment means ensuring that your data strategy is built to deliver value now and evolve over time.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 16px;"&gt;Case Studies – Current Client Examples&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;We are currently working with several companies in various capacities to help them navigate these rapidly increasing technology changes.&amp;nbsp; In one example, there is a new CFO who quickly surfaced deep frustrations with a lack of reporting flexibility causing inaccurate financial reporting. This was mainly triggered by inaccurate data, with internal teams struggling to deliver timely and trusted insights.&amp;nbsp; As a result, they are consolidating and modernizing their data architecture and ingestion standards to accommodate better internal and external reporting as well as centralize on a platform for future AI usage.&amp;nbsp; This protected investment will enable them to also reduce technical debt, saving crucial dollars as they pivot to an outcomes-based model. We partnered with the office of the CFO to implement a new “Ways of Working” framework to increase the time to market, increasing reporting cycle times with more accuracy, and with alignment of the needs of executive leadership. More importantly, the organization is building a foundation for ongoing agility, one where data and delivery practices move in lockstep to support informed decision-making.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 16px;"&gt;Myths that Commonly Undermine Technology ROI&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;Even with the best intentions, many organizations fall victim to myths that tend to erode the anticipated value of their technology investments.&amp;nbsp; Three of these common myths are outlined below:&lt;/font&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;span style=""&gt;&lt;font style="font-size: 16px;"&gt;If we build it, they will come…&lt;/font&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;Launching a new platform or dashboard does not always guarantee adoption. Without clear communications, planning, user training and ongoing engagement, even the most well-designed solutions can sit unused. Adoption must be a part of the delivery plan from Day One!&lt;/font&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;Our data is so messy, we have no choice but to manipulate it…&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;This mindset stops progress before it even begins. The reality is: messy data is normal, and waiting for it to be perfect is a losing game. The real opportunity lies in embracing the mess, by putting the right strategy, standards, and tools in place to transform raw data into trusted, business-ready insights. Progress starts with what you have and engaging with your current data, however imperfect, is what drives maturity, trust and value. Every successful data journey begins with taking inventory, finding out what is actually useful and committing to iterative improvement.&lt;/font&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;font style="font-size: 16px;"&gt;We’ll add analytics in later, this project is too large&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;Deferring analytics to the end of a large initiative is one of the fastest ways to lose momentum and miss early wins. Embedding analytics from the beginning helps guide decisions, demonstrate progress, and ensure the final product delivers actionable insights, not just functionality.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 16px;"&gt;Conclusion – Build with Purpose, Protect with Discipline&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;&lt;font style="font-size: 16px;"&gt;&lt;font face="Aptos, sans-serif"&gt;Technology is evolving faster than ever, and with that speed comes both opportunity and risk. Protecting your investment isn’t just about choosing the right tools, it’s about aligning those tools to real and measurable business outcomes.&amp;nbsp; Designing for usability and adoption and ensuring data becomes a driver of insight rather than a source of confusion. As a delivery consultant, I’ve seen firsthand how purposeful strategy, pragmatic execution, and the willingness to challenge long-held myths can transform initiatives from costly experiments into long-term value engines. No matter where you are on your journey, it’s important to start with intentionality, because protecting your investment starts with making sure it was built to matter in the first place.&lt;/font&gt;&lt;/font&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;&lt;font style="font-size: 16px;" face="Aptos, sans-serif"&gt;&lt;strong&gt;By&lt;/strong&gt;: Brian Henn – Sr. VP of Solutions Delivery and Data Practice Director at Vaco by Highspring&amp;nbsp;&lt;/font&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13494458</link>
      <guid>https://www.technologyfirst.org/Tech-News/13494458</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Tue, 01 Apr 2025 04:30:00 GMT</pubDate>
      <title>What’s All the Fuss About Agentic Artificial Intelligence?</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Newsletter/Dave%20Hatter%20Blog%20Header%20April%202025.png" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;While Artificial Intelligence (AI) has been a hot topic for some time now, AI Agentics, an innovative new type of AI, is shaking up both the business and technology community. Harvard Business Review’s recent article &lt;a href="https://hbr.org/2024/12/what-is-agentic-ai-and-how-will-it-change-work"&gt;What is Agentic IU and How Will it Chat Work?&lt;/a&gt;, said “From the early days of mechanical automatons to more recent conversational bots, scientists and engineers have dreamed of a future where AI systems can work and act intelligently and independently. Recent advances in agentic AI bring that autonomous future&amp;nbsp;a step closer to reality.” Let’s dive into what it is, how it can be used and the pros and cons of Agentic AI.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What Is AI Agentics?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;According to IBM, “Agentic AI is an &lt;a href="https://www.ibm.com/think/artificial-intelligence"&gt;artificial intelligence&lt;/a&gt; system that can accomplish a specific goal with limited supervision. It consists of AI agents—machine learning models that mimic human decision-making to solve problems in real time.”&amp;nbsp; In short, AI Agentics are autonomous AI agents that can make decisions and take actions to achieve goals without human oversight. Think of them as super powered digital assistants, instead of just fetching your calendar or drafting an email, they can manage workflows, troubleshoot systems, or even negotiate deals.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;These agents are built on advanced &lt;a href="https://mitsloan.mit.edu/ideas-made-to-matter/machine-learning-explained"&gt;Machine Learning&lt;/a&gt; (ML) models, often leveraging &lt;a href="https://www.nvidia.com/en-us/glossary/large-language-models/"&gt;Large Language Models&lt;/a&gt; (LLMs) like those powering ChatGPT, Grok or Copilot. The key differentiator from traditional AI is their agency, they’re not just reactive; they’re proactive. They can operate autonomously in complex, dynamic environments and can adapt based on feedback.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;At Intrust IT, we’ve built Marissa, an AI agent that answers, analyzes and routes inbound phone calls to the proper place, freeing up our team to focus on higher value tasks for our clients. Marissa currently manages about 40 percent of all inbound phone calls each week and gets a little better week after week. Marissa is a tireless assistant that handles grunt work, allowing our team to provide more responsive advice and support for our clients. Marissa is a real-world example of Agentic AI at work providing significant business value for our company and our clients.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;Marissa is just one example; the applications of AI Agentics are vast and growing for both business and IT operations. Here are some other examples:&lt;/font&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;font face="Rubik"&gt;A wholesaler uses an AI agent to negotiate with buyers, analyzing past deals, current inventory, and the buyer’s budget to propose optimized terms.&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Rubik"&gt;An e-commerce company uses an AI agent to analyze competitor prices, customer demand, and market trends in real-time, adjusting product prices to move more product or maximize profit.&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Rubik"&gt;A subscription service employs an AI agent to watch user behavior to predict cancellations then offer personalized incentives to reduce cancellations.&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Rubik"&gt;A healthcare provider uses an AI agent to scrub patient records and flag outliers.&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Rubik"&gt;A software company uses an AI agent to review code to find bugs and vulnerabilities and to suggest code optimizations.&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;The Pros of Agentic AI&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;AI Agentics bring a lot to the table including:&lt;/font&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;font face="Rubik"&gt;&lt;strong&gt;Efficiency&lt;/strong&gt;: Tasks that once took hours—like debugging a distributed system or analyzing logs—can be done in minutes. Agents work 24/7/365 without rest or burnout.&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Rubik"&gt;&lt;strong&gt;Scalability&lt;/strong&gt;: One agent can manage something that might need a team of humans, making it easier to manage growing workloads without growing headcount.&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Rubik"&gt;&lt;strong&gt;Proactivity&lt;/strong&gt;: Unlike traditional automation, agents anticipate problems and act proactively.&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Rubik"&gt;&lt;strong&gt;Cost Savings&lt;/strong&gt;: By reducing manual work, agents can lower operational costs.&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Rubik"&gt;&lt;strong&gt;Adaptability&lt;/strong&gt;: With continuous learning, agents improve over time.&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;The Cons of Agentics AI&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;While there are many benefits, Agentic AI comes with serious challenges that must be addressed:&lt;/font&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;font face="Rubik"&gt;&lt;strong&gt;Complexity&lt;/strong&gt;: Building and managing AI agents requires expertise in AI, technology and business. Debugging an agent that’s not working correctly can be difficult due to the “black box” like nature of AI.&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Rubik"&gt;&lt;strong&gt;Control&lt;/strong&gt;: If an agent misinterprets its objectives, like aggressively cutting prices to drive revenue, it can cause big problems. Agents must be tested rigorously and thoroughly and rolled out slowly.&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Rubik"&gt;&lt;strong&gt;Security Risks&lt;/strong&gt;: Agents with access to sensitive systems and data are potential attack vectors. A compromised agent could wreak havoc much faster than a human hacker and may fly under the radar.&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Rubik"&gt;&lt;strong&gt;Ethics and Accountability&lt;/strong&gt;: Who can be held to account when an agent goes astray? The developer? The business? The agent itself? This evolving gray area can be tricky to navigate.&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Rubik"&gt;&lt;strong&gt;Upfront Cost&lt;/strong&gt;: Developing or licensing advanced agents can be expensive and may bust the budget of small organizations.&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Striking A Balance&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;The meteoric rise of AI Agentics is an opportunity as well as a challenge. For now, the key is augmenting, not replacing, human expertise. Start small. Deploy an agent for a low-risk task, then scale up as you refine its behavior and grow your knowledge and expertise. Pair agents with robust oversight tools—kill switches, audit logs, and human-in-the-loop checks—to mitigate your risk.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why all the Fuss?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;So, what’s all the fuss about AI Agentics? Agentic AI promises a future&lt;/font&gt; &lt;font face="Rubik"&gt;where costs go down and productivity goes up as repetitive tasks fade away. A future where professionals focus on innovation and strategy. These agents promise to transform how we manage organizations due to systems that are smarter, faster, and more resilient. But they also demand reimagining skills, processes, security, and &lt;font&gt;accountability.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;" face="Rubik"&gt;The bottom line? AI Agentics isn’t just a trend—they’re a powerful and rapidly growing toolset. Embrace them thoughtfully, and they’ll amplify and extend your capabilities. Ignore them, and you and your organization risk being left behind in a world where autonomy is the new normal. The fuss isn’t just hype; it’s a wake-up call. It’s time to learn what AI Agentics can do for your organization&lt;/font&gt;&lt;font face="Rubik" style="font-size: 18px;"&gt;.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;Dave Hatter – CISSP, CISA, CISM, CCSP, CSSLP, PMP, ITIL, is a cybersecurity consultant and employee owner at &lt;a href="https://www.intrust-it.com/"&gt;Intrust IT.&lt;/a&gt; Dave has more than 30 years’ experience in technology as a software engineer and cybersecurity consultant and has served as an adjunct professor at &lt;a href="https://www.cincinnatistate.edu/"&gt;Cincinnati State&lt;/a&gt; for over 20 years. He is a privacy advocate and an Advisory Board member of the &lt;a href="https://www.plunkfoundation.org/team"&gt;Plunk Foundation&lt;/a&gt;. Follow Dave on X (&lt;a href="https://twitter.com/davehatter"&gt;@DaveHatter&lt;/a&gt;) for timely and helpful technology news and tips.&lt;/font&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13481267</link>
      <guid>https://www.technologyfirst.org/Tech-News/13481267</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Tue, 01 Apr 2025 04:30:00 GMT</pubDate>
      <title>5 Things Every Tech Leader Should Stop Doing – Now!</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Newsletter/Louie%20Hollmeyer%20Blog%20April%202025.png" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#0E101A" face="Rubik"&gt;The role of a technology leader is a balancing act of innovation, resource management, and strategic foresight. Yet, no matter how experienced or forward-thinking a leader may be, adhering to dated approaches and failing to adapt quickly can hinder an organization’s growth. Here’s what every tech leader should stop doing to ensure their organization thrives in an increasingly competitive technology landscape.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#0E101A"&gt;1. Sticking with Legacy&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#0E101A" face="Rubik"&gt;Legacy systems may feel reliable, but they carry hidden costs that can weigh heavily on an organization’s operations. Maintenance expenses, inefficiencies, and incompatibility with newer technologies can obstruct scalability and growth, creating short- and long-term competitive disadvantages.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#0E101A" face="Rubik"&gt;Additionally, staying dependent on outdated systems can frustrate both employees and customers. Slow interfaces, limited functionality, and inefficiency in responding to demands affect productivity and satisfaction.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#0E101A" face="Rubik"&gt;One key responsibility of a tech leader is to foster an environment of progress. This means phasing out legacy systems in favor of modern, scalable solutions. Migrating to the cloud, for example, offers enhanced agility and cost optimization compared to on-premise systems. Though transitions take effort and there is some inherent risk, the benefits far surpass the short-term inconvenience.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#0E101A"&gt;2. Under-Resourcing Cybersecurity&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#0E101A" face="Rubik"&gt;Cybersecurity is not a corner to cut, it’s a foundation to uphold. However, many organizations still fail to allocate adequate resources, often viewing it as an expense rather than insurance or, better yet, an investment. This approach can have catastrophic effects.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#0E101A" face="Rubik"&gt;Powered by AI, cyber threats are more sophisticated than ever, ranging from ransomware attacks to end-user and insider breaches. Underfunding your cybersecurity initiatives creates vulnerabilities that bad actors will exploit. Not fully protecting your environment could mean loss of proprietary data, damage to your company’s reputation, and heavy financial penalties due to non-compliance with data protection regulations.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#0E101A"&gt;3. Delaying Adoption&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#0E101A" face="Rubik"&gt;It’s natural to fall into the trap of waiting until a technology trend “matures” or becomes “accepted” before exploring its potential, but technology does not wait. Delaying the adoption of emerging technologies, platforms, and services often places organizations at a competitive disadvantage. Companies that hesitate risk losing market share to faster-moving rivals who leverage innovation to streamline processes, reduce costs, or enhance customer experiences.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#0E101A" face="Rubik"&gt;Take cloud communications, for example. Despite its widespread adoption across industries, some organizations continue to rely entirely on premise–based phone systems that long ago lost the modernization race with Unified Communications as a Service (UCaaS).&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#0E101A" face="Rubik"&gt;Early adopters of next-gen technologies have reaped the benefits of efficiency, scalability, and data-driven decision-making. Meanwhile, organizations that delay implementation often find themselves playing an expensive game of catch-up. Instead of assuming these advancements are “not ready yet,” adopt an agile approach that allows small-scale testing before rolling out.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#0E101A"&gt;4. DIYing Everything&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#0E101A" face="Rubik"&gt;“DIY” is a Midwestern staple, but the “DIY everything” approach is not scalable, or even sustainable in today’s technology landscape. When managing complex IT ecosystems dependent upon rapidly changing technologies, DIY is a recipe for bottlenecks and oversights. Tech leaders who insist on building proprietary solutions or choose to “go it alone”—out of budget-consciousness or a desire for control—often discover that the results can be less than desired and can be more challenging to scale, maintain, or integrate.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#0E101A" face="Rubik"&gt;Outsourcing, leveraging third-party expertise, and collaborating with skilled IT partners can be an efficient and sustainable way to scale your team. These partners bring specialized expertise, allowing your in-house team to be more strategic with a focus on core business objectives. By stopping the impulse to “DIY everything,” tech leaders can increase internal bandwidth and resources, ensuring strategic priorities receive the attention they deserve. And, the IT team gets the attention it deserves!&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#0E101A"&gt;5. Undervaluing Soft Skills&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#0E101A" face="Rubik"&gt;Traditionally, IT leadership has focused on technical expertise, certifications, and project-specific skills. While these are undeniably essential, overlooking the value of soft skills like communication, collaboration, emotional intelligence, and leadership can undermine overall effectiveness.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#0E101A" face="Rubik"&gt;Tech leaders frequently engage with diverse stakeholders—from executive teams to end-users—requiring the ability to translate complex concepts across a broad spectrum of personas. Soft skills help bridge this gap, promote collaboration, and build trust. IT organizations led by individuals who emphasize both soft skills and technical expertise are far more likely to achieve cohesion and alignment across functions. Stopping the undervaluation of soft skills is a simple yet powerful move toward becoming a C-level, IT rock star.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#0E101A"&gt;Final Take&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;&lt;font color="#0E101A" face="Rubik" style="font-size: 18px;"&gt;The demands of IT leadership are vast, requiring expertise across various segments of technology, processes, people, and systems. The greatest leaders are those willing to continually reassess their approaches and practices. By addressing these common pitfalls—sticking with legacy, under-resourcing cybersecurity, delaying technology adoption, DIYing everything, and undervaluing soft skills—tech leaders will pave the way for greater agility, security, and success.&lt;/font&gt;

&lt;p style="line-height: 14px;"&gt;&lt;font face="Rubik" style="font-size: 18px;"&gt;Louie Hollmeyer is a seasoned B2B tech marketer with over 25 years of experience. With Advanced Technology Consulting (ATC), Hollmeyer serves as a hybrid marketer, business development executive and consultant, specializing in voice, data, cloud, cybersecurity, and data &amp;amp; AI services. ATC, located in Liberty Township, OH, is an independent IT consulting and professional services firm with access to an extensive portfolio of over 700 technology providers.&lt;/font&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13481287</link>
      <guid>https://www.technologyfirst.org/Tech-News/13481287</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Tue, 01 Apr 2025 04:30:00 GMT</pubDate>
      <title>AI Isn’t a Trend, It’s Your New Normal</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Newsletter/Hailey%20Clark%20Blog%20April%202025.png" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;Tech leaders today, knowingly or unknowingly, are facing a critical choice: embrace artificial intelligence now or wait and risk falling behind. A.I. isn’t just a trendy buzzword; it's a transformative technology already reshaping industries. While 2023 is widely recognized as the breakout year for generative A.I. (thanks largely to tools like ChatGPT becoming widely accessible, the launch of Microsoft Copilot, and Google's Gemini/Bard integration into Google Search), major companies have been leveraging A.I. internally for years, refining the very systems and solutions we're seeing unveiled almost daily.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;And with that comes exploration. Employees across sectors are independently exploring A.I. solutions, often without structured leadership support. This fragmented approach risks overlooking critical considerations like data hygiene, workflow integration, data privacy, and collaborative strategy development. Meanwhile, companies that have proactively adopted A.I. are already seeing strategic advantages.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;Global A.I. spending is expected to exceed &lt;a href="https://www.idc.com/getdoc.jsp?containerId=IDC_P33198"&gt;$300 billion by 2026&lt;/a&gt;, as highlighted by&lt;a href="https://s3.amazonaws.com/serviceinfrastructure-clientresourc-privatebucket-hulj6kr8q1gw/public/clients/h77dhukpzfycybvy5hl/clients/files/VUodNXSF7SFulK8Zfzw/Dayton-AI.menke.pptx"&gt;keynote speaker Mike Menke at Technology First’s AI Day&lt;/a&gt;. Rapid advancements from GPT-1 to GPT-4 and upcoming technologies like Gemini Ultra illustrate that the AI landscape is evolving faster than ever. Leaders can no longer afford to observe from the sidelines.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;For hesitant leaders, now is the time to start evaluating A.I.'s impact on competition, customer expectations, and internal processes. Conducting detailed assessments can help identify operational disruptions, data gaps, and competitive risks associated with delaying A.I. adoption.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;Organizations already adopting A.I. should consider their actions a validation of their strategic foresight, positioning them for sustained relevance and agility. To maintain long-term success, continued refinement, transparent communication, and ongoing stakeholder engagement are crucial, alongside proactive adaptation to rapid technological advancements and associated risks.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;For organizations currently adapting to these changes, successful A.I. implementation requires more than technological solutions. Tech modernization efforts demand effective organizational change management strategies. Employees may fear job displacement, making transparency and open dialogue essential. Clear communication about how A.I. will enhance, rather than replace, human work, combined with inclusive training programs, can alleviate concerns and foster a collaborative environment.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;Clinging to traditional methods presents a significant risk. Even sectors once seen as insulated, such as retail and manufacturing, must embrace A.I.-driven improvements to stay competitive. Companies like Meta, Apple, Google, OpenAI, and Amazon have integrated A.I. deeply into their operations, setting new standards for industry expectations.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;The term "A.I." may soon fade into routine usage, but its transformative impacts will persist. Leaders resisting A.I. adoption risk appearing stagnant, while proactive competitors shape the future of trustworthy A.I. use.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;Companies slow to integrate A.I. strategically face long-term disadvantages. Leaders should begin by defining clear objectives, investing in employee education, performing impact assessments, and adopting robust change management strategies.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Practical steps for leaders to adapt to A.I. include:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;&lt;font face="Rubik"&gt;Conducting impact assessments to identify A.I. opportunities and risks.&lt;/font&gt;&lt;/strong&gt;&lt;/li&gt;

  &lt;li&gt;&lt;strong&gt;&lt;font face="Rubik"&gt;Forming internal working groups to explore A.I. systematically.&lt;/font&gt;&lt;/strong&gt;&lt;/li&gt;

  &lt;li&gt;&lt;strong&gt;&lt;font face="Rubik"&gt;Implementing targeted employee training for A.I. literacy.&lt;/font&gt;&lt;/strong&gt;&lt;/li&gt;

  &lt;li&gt;&lt;strong&gt;&lt;font face="Rubik"&gt;Encouraging transparent communication to secure employee buy-in.&lt;/font&gt;&lt;/strong&gt;&lt;/li&gt;

  &lt;li&gt;&lt;strong&gt;&lt;font face="Rubik"&gt;Launching pilot projects to test A.I. effectiveness.&lt;/font&gt;&lt;/strong&gt;&lt;/li&gt;

  &lt;li&gt;&lt;strong&gt;&lt;font face="Rubik"&gt;Ensuring data hygiene and adapting management practices accordingly.&lt;/font&gt;&lt;/strong&gt;&lt;/li&gt;

  &lt;li&gt;&lt;strong&gt;&lt;font face="Rubik"&gt;Promoting cross-departmental collaboration for maximum insight.&lt;/font&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Ultimately, success in A.I. adoption depends on effective organizational change management:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;&lt;font face="Rubik"&gt;Clearly articulate how A.I. aligns with organizational goals.&lt;/font&gt;&lt;/strong&gt;&lt;/li&gt;

  &lt;li&gt;&lt;strong&gt;&lt;font face="Rubik"&gt;Engage senior leaders early as champions of A.I. initiatives.&lt;/font&gt;&lt;/strong&gt;&lt;/li&gt;

  &lt;li&gt;&lt;strong&gt;&lt;font face="Rubik"&gt;Maintain transparent and consistent communication.&lt;/font&gt;&lt;/strong&gt;&lt;/li&gt;

  &lt;li&gt;&lt;strong&gt;&lt;font face="Rubik"&gt;Provide continuous resources and support for employee transitions.&lt;/font&gt;&lt;/strong&gt;&lt;/li&gt;

  &lt;li&gt;&lt;strong&gt;&lt;font face="Rubik"&gt;Regularly monitor progress, measure impact, and adjust strategies as needed.&lt;/font&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;font face="Rubik" style="font-size: 18px;"&gt;Leaders who act decisively today position their organizations to thrive in an A.I.-driven future. Regardless of whether your organization immediately adopts A.I. or your business opts to instead create policies to mitigate its usage, it's crucial to thoroughly assess your marketplace to understand how A.I. could impact your business positively or negatively. A.I. is here to stay, and comprehensively evaluating its implications ensures you're not left unprepared in an increasingly competitive landscape.&lt;/font&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;Hailey M. Clark is the Creative Marketing Specialist at The Greentree Group &amp;amp; Back To Business I.T. With over 20 years of marketing experience, she is passionate about supporting small businesses through digital innovation and strategic marketing initiatives.&lt;/font&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13481292</link>
      <guid>https://www.technologyfirst.org/Tech-News/13481292</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Fri, 28 Feb 2025 14:02:26 GMT</pubDate>
      <title>A Guide to Data Security for Small and Midsized Enterprises</title>
      <description>&lt;p&gt;&lt;font style="font-size: 12px;"&gt;&lt;img src="https://www.technologyfirst.org/resources/Newsletter/Josh%20Barrett%20Blog%20March%202025.png" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 12px;"&gt;Whether you’re handling customer information, financial records, or proprietary product details, safeguarding that data isn’t just a compliance requirement; it’s critical to maintaining customer trust, brand reputation, and the overall health of your business. However, small and midsized businesses (SMBs) often face unique challenges, such as limited IT resources and tighter budgets, making data security all the more challenging.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font face="Rubik" style="font-size: 14px;"&gt;Why Data Security Is Critical for SMBs&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
  &lt;li&gt;&lt;font face="Rubik" style="font-size: 12px;"&gt;&lt;strong&gt;Brand Reputation and Customer Trust&lt;/strong&gt;&lt;br&gt;
  A single data breach can undermine years of hard-earned trust. Small and midsized businesses often rely on close customer relationships and community reputation. Maintaining robust data security measures ensures customers feel safe doing business with you.&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Rubik" style="font-size: 12px;"&gt;&lt;strong&gt;Regulatory Compliance&lt;/strong&gt;&lt;br&gt;
  Various regulations like PCI and HIPAA require strict data protection. Non-compliance can result in hefty fines and legal trouble, creating significant financial strain for SMBs.&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Rubik" style="font-size: 12px;"&gt;&lt;strong&gt;Preventing Operational Disruptions&lt;/strong&gt;&lt;br&gt;
  Cyber attacks can cause severe downtime, impacting your ability to serve customers. Considering SMBs typically have leaner teams, recovering from a security incident can take more time, causing a ripple effect of lost revenue and productivity.&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Rubik" style="font-size: 12px;"&gt;&lt;strong&gt;Competitive Advantage&lt;/strong&gt;&lt;br&gt;
  In many industries, security assurances are becoming a key differentiator. Demonstrating rigorous data protection can help win new clients, particularly those who handle sensitive information.&lt;/font&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;&lt;font face="Rubik" style="font-size: 14px;"&gt;Common Security Risks Facing SMBs&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
  &lt;li&gt;&lt;font face="Rubik" style="font-size: 12px;"&gt;&lt;strong&gt;Phishing Attacks&lt;/strong&gt;&lt;br&gt;
  Cybercriminals often use deceptive emails or messages to trick employees into divulging login credentials, credit card numbers, or other sensitive information. SMBs can be especially vulnerable because they may lack formalized security protocols or employee training programs.&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Rubik" style="font-size: 12px;"&gt;&lt;strong&gt;Ransomware&lt;/strong&gt;&lt;br&gt;
  Ransomware is a type of malicious software that encrypts your data, rendering it unusable until a ransom is paid. Smaller businesses might feel pressured to pay due to limited resources and backup systems, making them prime targets.&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Rubik" style="font-size: 12px;"&gt;&lt;strong&gt;Insider Threats&lt;/strong&gt;&lt;br&gt;
  Employees, contractors, or partners with legitimate access can inadvertently (or intentionally) expose or misuse data. SMBs often have flat hierarchies and broad access privileges, which can increase the risk of insider threats.&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Rubik" style="font-size: 12px;"&gt;&lt;strong&gt;Unsecured Network and Devices&lt;/strong&gt;&lt;br&gt;
  SMBs may rely on a mix of personal and company-owned devices, and employees might connect from unsecured networks. This creates multiple potential entry points for hackers to exploit.&lt;/font&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;&lt;font face="Rubik" style="font-size: 14px;"&gt;Essential Data Security Best Practices&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
  &lt;li&gt;
    &lt;font face="Rubik" style="font-size: 12px;"&gt;&lt;strong&gt;Implement Strong Authentication&lt;/strong&gt;&lt;/font&gt;

    &lt;ul&gt;
      &lt;li&gt;&lt;font face="Rubik" style="font-size: 12px;"&gt;&lt;strong&gt;Use Multi-Factor Authentication (MFA):&lt;/strong&gt; Adding a second verification step—such as a text message code, biometric scan, or app-based token.&lt;/font&gt;&lt;/li&gt;

      &lt;li&gt;&lt;font face="Rubik" style="font-size: 12px;"&gt;&lt;strong&gt;Limit Logins to Company-Owned IP Addresses:&lt;/strong&gt; Configure access controls to allow remote access only from whitelisted IP addresses owned by the organization. This approach minimizes unauthorized login attempts by ensuring that only connections originating from your internal network or approved gateways can reach critical systems.&lt;/font&gt;&lt;/li&gt;
    &lt;/ul&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;font face="Rubik" style="font-size: 12px;"&gt;&lt;strong&gt;Encrypt Sensitive Data&lt;/strong&gt;&lt;/font&gt;

    &lt;ul&gt;
      &lt;li&gt;&lt;font face="Rubik" style="font-size: 12px;"&gt;&lt;strong&gt;Data at Rest:&lt;/strong&gt; Store files in encrypted formats, whether on-premises or in the cloud. Modern operating systems offer built-in disk encryption such as Bitlocker, and many cloud services include encryption features.&lt;/font&gt;&lt;/li&gt;

      &lt;li&gt;&lt;font face="Rubik" style="font-size: 12px;"&gt;&lt;strong&gt;Data in Transit:&lt;/strong&gt; Use secure protocols (HTTPS, SSL/TLS) for data transfer, ensuring information is protected as it moves between internal systems or over the internet.&lt;/font&gt;&lt;/li&gt;
    &lt;/ul&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;font face="Rubik" style="font-size: 12px;"&gt;&lt;strong&gt;Regular Software Updates and Patch Management&lt;/strong&gt;&lt;/font&gt;

    &lt;ul&gt;
      &lt;li&gt;&lt;font face="Rubik" style="font-size: 12px;"&gt;&lt;strong&gt;Automated Updates:&lt;/strong&gt; Whenever possible, enable automatic updates to keep operating systems, antivirus software, and applications current.&lt;/font&gt;&lt;/li&gt;

      &lt;li&gt;&lt;font face="Rubik" style="font-size: 12px;"&gt;&lt;strong&gt;Patch Management Tools:&lt;/strong&gt; If you have multiple devices or servers, consider a patch management solution that lets you schedule and track updates from a central console.&lt;/font&gt;&lt;/li&gt;
    &lt;/ul&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;font face="Rubik" style="font-size: 12px;"&gt;&lt;strong&gt;Frequent Data Backups&lt;/strong&gt;&lt;/font&gt;

    &lt;ul&gt;
      &lt;li&gt;&lt;font face="Rubik" style="font-size: 12px;"&gt;&lt;strong&gt;Off-Site or Cloud Backups:&lt;/strong&gt; Keep copies of critical data in multiple locations—ideally in encrypted, secure cloud storage.&lt;/font&gt;&lt;/li&gt;

      &lt;li&gt;&lt;font face="Rubik" style="font-size: 12px;"&gt;&lt;strong&gt;Test Recovery Processes:&lt;/strong&gt; A backup is only as good as your ability to restore it. Run periodic recovery drills to ensure backups are functioning properly.&lt;/font&gt;&lt;/li&gt;
    &lt;/ul&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;font face="Rubik" style="font-size: 12px;"&gt;&lt;strong&gt;Network Segmentation&lt;/strong&gt;&lt;/font&gt;

    &lt;ul&gt;
      &lt;li&gt;&lt;font face="Rubik" style="font-size: 12px;"&gt;&lt;strong&gt;Limit Lateral Movement:&lt;/strong&gt; If a hacker gains access to one part of your network, you want to prevent them from moving freely to other systems. Segment your network to create isolated environments for sensitive information.&lt;/font&gt;&lt;/li&gt;

      &lt;li&gt;&lt;font face="Rubik" style="font-size: 12px;"&gt;&lt;strong&gt;Access Control Lists (ACLs) and Firewalls:&lt;/strong&gt; Restrict network traffic between segments using firewalls and ACLs.&lt;/font&gt;&lt;/li&gt;
    &lt;/ul&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;font face="Rubik" style="font-size: 12px;"&gt;&lt;strong&gt;Employee Training and Awareness&lt;/strong&gt;&lt;/font&gt;

    &lt;ul&gt;
      &lt;li&gt;&lt;font face="Rubik" style="font-size: 12px;"&gt;&lt;strong&gt;Phishing Simulations:&lt;/strong&gt; Conduct regular phishing tests to help employees recognize suspicious emails.&lt;/font&gt;&lt;/li&gt;

      &lt;li&gt;&lt;font face="Rubik" style="font-size: 12px;"&gt;&lt;strong&gt;Clear Security Policies:&lt;/strong&gt; Provide guidelines on handling data, using personal devices for work, and reporting potential threats. Clear policies help your team make secure decisions daily.&lt;/font&gt;&lt;/li&gt;
    &lt;/ul&gt;
  &lt;/li&gt;

  &lt;li&gt;
    &lt;font face="Rubik" style="font-size: 12px;"&gt;&lt;strong&gt;Endpoint and Anti-Malware Protection&lt;/strong&gt;&lt;/font&gt;

    &lt;ul&gt;
      &lt;li&gt;&lt;font face="Rubik" style="font-size: 12px;"&gt;&lt;strong&gt;Robust Antivirus/Anti-Malware Solutions:&lt;/strong&gt; Deploy reputable security software to monitor and block known threats.&lt;/font&gt;&lt;/li&gt;

      &lt;li&gt;&lt;font face="Rubik" style="font-size: 12px;"&gt;&lt;strong&gt;Device Management:&lt;/strong&gt; Use Mobile Device Management (MDM) or endpoint management tools to enforce security policies on company- or employee-owned devices.&lt;/font&gt;&lt;/li&gt;
    &lt;/ul&gt;
  &lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;&lt;font face="Rubik" style="font-size: 14px;"&gt;Getting Started with a Data Security Strategy&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
  &lt;li&gt;&lt;font face="Rubik" style="font-size: 12px;"&gt;&lt;strong&gt;Conduct a Risk Assessment&lt;/strong&gt;&lt;br&gt;
  Identify the most critical systems, data assets, and vulnerabilities. This will help you prioritize your security investments where they can make the biggest impact.&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Rubik" style="font-size: 12px;"&gt;&lt;strong&gt;Create an Incident Response Plan&lt;/strong&gt;&lt;br&gt;
  Plan out step-by-step procedures for handling security breaches or suspicious activity. Clearly define roles and responsibilities for your team and detail how you’ll communicate with customers, partners, and authorities.&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Rubik" style="font-size: 12px;"&gt;&lt;strong&gt;Allocate a Security Budget&lt;/strong&gt;&lt;br&gt;
  Assess how much you can realistically invest in data security tools, training, and personnel. Even modest budgets can fund essential solutions—like antivirus software, firewalls, and backup systems.&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Rubik" style="font-size: 12px;"&gt;&lt;strong&gt;Train Your Staff&lt;/strong&gt;&lt;br&gt;
  A security system is only as strong as its weakest link—often human error. Regular training sessions and easy-to-understand policies can turn employees into your first line of defense.&lt;/font&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;&lt;font face="Rubik" style="font-size: 14px;"&gt;Conclusion&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 12px;"&gt;Data security is no longer a “nice to have”—it’s a critical component of running a successful and trusted small or midsized business. Cyber threats evolve daily, and SMBs must remain vigilant to protect sensitive information, maintain compliance, and keep operations running smoothly. By implementing strong security practices—like multi-factor authentication, encryption, network segmentation, and ongoing employee training—you can significantly reduce your risk profile and safeguard your business.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 12px;"&gt;Remember: cybersecurity is a journey, not a destination. Stay informed about evolving threats and emerging best practices and continually refine your security measures. With a proactive and well-rounded approach, your SMB can secure its valuable data, build customer trust, and thrive in an increasingly digital marketplace.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 12px;"&gt;&lt;strong&gt;Josh Barrett&lt;/strong&gt; is the Co-founder of BlueHat, a technology success partner specializing in cyber security and IT services for the mid and small business markets. &amp;nbsp;Josh graduated from UC with a degree in cybersecurity, has been a practicing professional for more than 12 years, Josh is CISSP certified.&lt;/font&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13468975</link>
      <guid>https://www.technologyfirst.org/Tech-News/13468975</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Fri, 28 Feb 2025 13:53:05 GMT</pubDate>
      <title>Breaking Barriers: Empowering Professionals with Disabilities in IT &amp; Cybersecurity</title>
      <description>&lt;p&gt;&lt;font style="font-size: 12px;"&gt;&lt;img src="https://www.technologyfirst.org/resources/Newsletter/Justin%20LeBrun%20Blog%20March%202025.png" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 12px;"&gt;The technology industry is evolving rapidly, with cybersecurity and IT roles in high demand. Businesses across all sectors struggle to find skilled professionals to fill critical positions. Despite the abundance of opportunities, many talented individuals find themselves shut out—not due to a lack of qualifications but because of barriers unrelated to their technical abilities. Among the most overlooked are professionals with disabilities, who, despite meeting or exceeding job requirements, often face challenges securing interviews and job offers.&lt;/font&gt;&lt;/p&gt;

&lt;h2&gt;&lt;font style="font-size: 12px;"&gt;&lt;strong&gt;The Hidden Barrier: When Qualifications Aren’t Enough&lt;/strong&gt;&lt;/font&gt;&lt;/h2&gt;

&lt;p&gt;&lt;font style="font-size: 12px;"&gt;At Phishbuster Academy, we frequently hear from students who have put in the effort to obtain the right credentials but still struggle to break into the field. There is one such student who recently came to Phishbuster Academy who truly stood out. This aspiring professional earned an associate’s degree in IT and even acquired CompTIA’s triple crown of entry-level certifications—A+, Network+, and Security+. By all accounts, this individual should be an ideal candidate for an entry-level IT or cybersecurity role. Yet, despite applying to numerous positions, he could not even secure an interview.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 12px;"&gt;Unfortunately, his story is not unique.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 12px;"&gt;Although this young man is fully capable and qualified for an entry-level IT position, he does have a disability. In a field that can be difficult to break into, for professionals with disabilities, they face additional barriers to employment often stemming from:&lt;/font&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;font style="font-size: 12px;"&gt;&lt;strong&gt;Employer misconceptions&lt;/strong&gt; about their capabilities.&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font style="font-size: 12px;"&gt;&lt;strong&gt;Rigid job requirements&lt;/strong&gt; that do not accommodate remote or adaptive work setups.&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font style="font-size: 12px;"&gt;&lt;strong&gt;A lack of focus on skills-based hiring&lt;/strong&gt;, leading to missed opportunities.&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;font style="font-size: 12px;"&gt;These obstacles prevent companies from accessing a talented pool of candidates who are fully capable of succeeding in IT and cybersecurity roles.&lt;/font&gt;&lt;/p&gt;

&lt;h2&gt;&lt;font style="font-size: 12px;"&gt;&lt;strong&gt;The Role of Remote &amp;amp; Adaptive Work Environments&lt;/strong&gt;&lt;/font&gt;&lt;/h2&gt;

&lt;p&gt;&lt;font style="font-size: 12px;"&gt;One of the biggest misconceptions in hiring is that IT and cybersecurity positions require a traditional office setting. In reality, many roles in these fields are well-suited for remote work and can be adapted to accommodate a variety of needs. With the right tools and policies in place, professionals with disabilities can thrive in:&lt;/font&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;font style="font-size: 12px;"&gt;&lt;strong&gt;Remote work environments&lt;/strong&gt;, which allow for flexible scheduling and accessible setups.&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font style="font-size: 12px;"&gt;&lt;strong&gt;Adaptive technologies when needed&lt;/strong&gt;, such as screen readers, voice-to-text software, and specialized hardware.&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font style="font-size: 12px;"&gt;&lt;strong&gt;Results-driven roles&lt;/strong&gt;, where success is measured by skills and problem-solving ability rather than physical presence.&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;font style="font-size: 12px;"&gt;Despite these advantages, many companies remain hesitant to implement these hiring practices or invest in the necessary accommodations.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 12px;"&gt;Consider the student mentioned earlier: He possesses the education, certifications, and motivation needed to excel in IT, yet he struggles to even get past the initial hiring stage. His experience reflects a broader industry issue that creates difficult barriers of entry. This highlights a crucial gap: while education and certifications lay the foundation, hands-on experience often serves as the missing piece.&lt;/font&gt;&lt;/p&gt;

&lt;h2&gt;&lt;font style="font-size: 12px;"&gt;&lt;strong&gt;How Employers Can Close the Gap&lt;/strong&gt;&lt;/font&gt;&lt;/h2&gt;

&lt;p&gt;&lt;font style="font-size: 12px;"&gt;The IT and cybersecurity industries face a talent shortage, yet many capable professionals remain overlooked due to outdated hiring practices and misconceptions about disabilities. Companies that embrace adaptive hiring practices, flexible work environments, and skills-based evaluation will not only tap into a wealth of underutilized talent but also foster a more diverse and innovative workforce. It’s time for the industry to break these barriers and open doors—because talent should be recognized, not overlooked.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 12px;"&gt;To bridge this divide and create more opportunities, companies can consider:&lt;/font&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;font style="font-size: 12px;"&gt;&lt;strong&gt;Adopt skills-based hiring&lt;/strong&gt;: Focus on an applicant’s actual technical abilities.&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font style="font-size: 12px;"&gt;&lt;strong&gt;Implement flexible and remote work policies&lt;/strong&gt;: Make accommodations that enable all employees to perform at their best.&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font style="font-size: 12px;"&gt;&lt;strong&gt;Support internship and job simulation programs&lt;/strong&gt;: Provide structured, hands-on opportunities that allow these professionals to gain real-world experience.&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;font style="font-size: 12px;"&gt;When faced with a candidate who has the education and certifications that highlight his intellectual abilities and foundational understanding of key concepts, the only thing left to do is prove that they have the technical abilities to do the job. But how can this develop if no entry-level positions are offered? That’s where job-simulated programs become a game changer.&lt;/font&gt;&lt;/p&gt;

&lt;h2&gt;&lt;font style="font-size: 12px;"&gt;&lt;strong&gt;The Path Forward&lt;/strong&gt;&lt;/font&gt;&lt;/h2&gt;

&lt;p&gt;&lt;font style="font-size: 12px;"&gt;That brings us to the next steps…where do we go from here? It’s not overly complicated, the path forward is essentially giving these candidates an opportunity to complete hands-on projects that simulate real-world job responsibilities. Adding in that last piece of the puzzle, projects that can highlight their technical experience and abilities. Especially in a state like Ohio, where programs like Tech Cred can make this type of training a reality by eliminating what is often a big concern – cost.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 12px;"&gt;&lt;strong&gt;Justin LeBrun&lt;/strong&gt; is the VP of Operations at Phishbuster Academy, an organization dedicated to providing hands-on cybersecurity training and real-world experience through job-simulated labs. With a passion for bridging the skills gap, he works to ensure aspiring professionals have the opportunity to build successful careers in IT and cybersecurity.&lt;/font&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13468971</link>
      <guid>https://www.technologyfirst.org/Tech-News/13468971</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Fri, 31 Jan 2025 16:35:41 GMT</pubDate>
      <title>CMMC Final Rule: Key Changes and Their Impact on Defense Contractors</title>
      <description>&lt;p&gt;&lt;font face="Verdana" style="font-size: 12px;"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/TechFirst%20Website/Eric%20Parsley%20Blog%20February%202025.png" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 12px;"&gt;The Cybersecurity Maturity Model Certification (CMMC) program, designed by the Department of Defense (DoD) to safeguard Controlled Unclassified Information (CUI) and Federal Contract Information (FCI), has undergone significant updates between its proposed rule in December 2023 and its final rule in October 2024. These changes reflect the DoD’s effort to balance cybersecurity requirements with practical considerations for contractors. With the final rule taking effect on December 16, 2024, understanding these changes is critical for contractors preparing for assessment.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 12px;"&gt;One of the most important changes in the final rule is the introduction of a clearly defined phased implementation plan. The proposed rule hinted at a gradual rollout but lacked specific milestones or timelines. The final rule addresses this by implementing a four-phase plan. Phase 1 introduces mandatory self-assessments for contractors handling FCI. Phase 2 brings in Level 2 certifications for select contracts involving CUI. Phase 3 extends certification requirements to high-priority programs through Level 3 assessments. Finally, Phase 4 marks the full implementation of CMMC requirements across all applicable DoD contracts. This structured approach ensures contractors have the time to adapt while the DoD scales its assessment capabilities. Initial estimates state that approx. 80,000 defense contractors require Level 2 Certification, so with the implementation of a phased rollout, the accreditation body and ecosystem should be able to stretch with the initial demand of assessments.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 12px;"&gt;Flexibility for Level 2 compliance has also been enhanced in the final rule through the introduction of conditional certification. Under the proposed rule, contractors were required to fully implement all 110 NIST SP 800-171 Rev 2 controls before achieving certification. The final rule now allows for conditional certification if contractors meet at least 80% of these requirements, provided they address gaps through a Plan of Action and Milestones (POA&amp;amp;M). This conditional status enables contractors to bid on contracts while granting them 180 days to close security gaps. However, failure to meet this deadline results in certification expiration, demonstrating that while the rule allows flexibility, it does not compromise accountability.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 12px;"&gt;The role of POA&amp;amp;Ms has been significantly refined. The proposed rule permitted their use but lacked clear guidelines on timelines and follow-ups. The final rule establishes firm deadlines, requiring all security gaps documented in POA&amp;amp;Ms to be resolved within 180 days. A POA&amp;amp;M closeout assessment is then mandated to verify compliance before final certification is granted. This change ensures that contractors address vulnerabilities promptly, mitigating the risks of long-standing cybersecurity weaknesses.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 12px;"&gt;The certification levels themselves have been clarified in the final rule. While the proposed rule outlined the three levels of CMMC, the final rule provides greater detail on the assessment processes and their frequency. Level 1 now mandates annual self-assessments for contractors handling FCI, with results reported in the Supplier Performance Risk System (SPRS). Level 2 introduces a distinction between self-assessments and third-party assessments conducted by CMMC Third-Party Assessment Organizations (C3PAOs). For Level 3, which is required for contractors handling critical CUI, assessments will be conducted by the Defense Industrial Base Cybersecurity Assessment Center (DIBCAC), with Level 2 certification as a prerequisite.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 12px;"&gt;Another area of improvement is the tracking and affirmation of compliance. The proposed rule required annual affirmations from senior officials but did not elaborate on enforcement or tracking mechanisms. The final rule enforces these affirmations across all certification levels, with contractors required to submit them annually through SPRS. Failure to affirm compliance results in the automatic lapse of certification, reinforcing the need for continuous cybersecurity maintenance rather than viewing CMMC as a one-time achievement.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 12px;"&gt;The integration of SPRS and the CMMC Enterprise Mission Assurance Support Service (eMASS) is another key update. While the proposed rule primarily relied on SPRS for self-assessment score submissions, the final rule expands this functionality. SPRS is now used for Levels 1 and 2 (Self) assessments, while eMASS is designated for third-party assessments at Level 2 (C3PAO) and Level 3. Assessment results are automatically transmitted to SPRS from eMASS, creating a seamless and centralized compliance tracking system.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 12px;"&gt;Scoping requirements have also been expanded and clarified in the final rule. The proposed rule provided limited guidance on defining in-scope systems and the role of External Service Providers (ESPs). In contrast, the final rule introduces clear scoping categories, including Contractor Risk Managed Assets, Security Protection Assets, and Specialized Assets. It also requires ESPs to meet equivalent CMMC security requirements when processing CUI but does not stipulate ESPs obtain the same level CMMC certification of their clients. These changes enhance clarity and ensure that contractors appropriately define the scope of their cybersecurity efforts.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 12px;"&gt;As the CMMC program evolves, contractors must prepare to align their cybersecurity programs with these updated requirements. The final rule reinforces the DoD’s commitment to safeguarding national security through a robust, scalable, and enforceable cybersecurity framework. For contractors, the path to compliance is not only a contractual obligation but a critical step in strengthening their resilience against cyber threats. Now is the time to act, ensuring readiness for the challenges and opportunities that the CMMC program brings.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 12px;"&gt;&lt;font style=""&gt;Eric Parsley&lt;/font&gt; &lt;font&gt;is a cybersecurity executive specializing in Governance, Risk, and Compliance (GRC). He is a vCISO for Expedient Technology Solutions offering cybersecurity focused MSP/MSSP Services. Eric holds a Master’s degree in Cybersecurity &amp;amp; Information Assurance and is a CMMC Certified Assessor.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13457430</link>
      <guid>https://www.technologyfirst.org/Tech-News/13457430</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Fri, 31 Jan 2025 16:09:41 GMT</pubDate>
      <title>How to Use CIAM to Elevate the Customer Experience</title>
      <description>&lt;p&gt;&lt;font face="Verdana" style="font-size: 12px;"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/TechFirst%20Website/Rich%20Keith%20Ping%20Identity%20Blog%20Febuary%202025.png" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 12px;"&gt;Digital channels, including websites, mobile apps, and social media, have become the primary touchpoint for establishing new customer relationships. In fact, 91% of adults ages 18 to 49 have purchased products or services online using a smartphone, according to Consumer Affairs.1 It’s crucial to make a good first impression during these customer interactions if you hope to build a loyal customer base.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 12px;"&gt;&lt;font&gt;This shifting dynamic creates new challenges and opportunities for businesses looking to attract and retain customers. The right&amp;nbsp;&lt;/font&gt;&lt;a href="https://hub.pingidentity.com/ciam/what-is-customer-identity-and-access-management-ciam"&gt;&lt;font color="#0000FF"&gt;customer identity and access management (CIAM)&lt;/font&gt;&lt;/a&gt;&lt;font&gt;&amp;nbsp;strategy can help you provide a positive customer experience.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font face="Verdana" style="font-size: 12px;"&gt;What Is CIAM?&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 12px;"&gt;CIAM allows businesses to securely capture and manage customers’ identity and profile data and control what applications, services, and information users have access to.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 12px;"&gt;The traditional approach to CIAM has tended to force the customer to provide as much information as possible at the point of registration and require them to log in with a username and password for every session. Taking this approach usually forces businesses to make user experience tradeoffs to secure how customers engage with their brand online.&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 12px;"&gt;Modern approaches to CIAM enable businesses to identify who their customers are and what applications they should have access to in a way that doesn’t require compromising convenience for security. By continuously assessing the trustworthiness of each customer’s identity throughout their session, businesses can dynamically adjust the level of authentication required based on real-time risk, making security visible only when necessary. This approach allows customers to securely engage with digital properties without encountering unnecessary friction.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 12px;"&gt;&lt;font&gt;CIAM can also help you streamline the end-to-end customer journey by making it easier to introduce&amp;nbsp;&lt;/font&gt;&lt;a href="https://www.pingidentity.com/en/platform/capabilities/single-sign-on.html"&gt;&lt;font color="#0000FF"&gt;single sign-on (SSO)&amp;nbsp;&lt;/font&gt;&lt;/a&gt;&lt;font&gt;for customers across all your digital properties, prompt customers for&amp;nbsp;&lt;/font&gt;&lt;a href="https://www.pingidentity.com/en/platform/capabilities/multi-factor-authentication.html"&gt;&lt;font color="#0000FF"&gt;multi-factor authentication (MFA)&lt;/font&gt;&lt;/a&gt;&lt;font&gt;&amp;nbsp;for additional security only when necessary, and ultimately move towards secure, convenient&amp;nbsp;&lt;a href="https://www.pingidentity.com/en/solutions/business-priority/passwordless.html"&gt;&lt;font color="#0000FF"&gt;passwordless authentication&lt;/font&gt;&lt;/a&gt;&amp;nbsp;experiences.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font face="Verdana" style="font-size: 12px;"&gt;How Can CIAM Deliver a Great Customer Experience?&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 12px;"&gt;&lt;font&gt;CIAM elevates the customer experience (CX) by simultaneously reducing friction and building trust. Our&amp;nbsp;&lt;/font&gt;&lt;a href="https://hub.pingidentity.com/surveys/4076-2024-consumer-survey-improved-digital-experiences"&gt;&lt;font color="#0000FF"&gt;2024 Consumer Survey&lt;/font&gt;&lt;/a&gt;&lt;font&gt;&amp;nbsp;found that “security” (78%) and “ease of use” (76%) were the most important aspects of interacting with brands online, highlighting the importance of delivering both secure and seamless journeys.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font face="Verdana" style="font-size: 12px;"&gt;Reduce Friction&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 12px;"&gt;With CIAM, you no longer need to push every customer through the same rigid authentication processes when they visit your site.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 12px;"&gt;For example, if they’re registering for the first time, you don’t need to ask them to enter all their personal data immediately, you could just ask them to provide their email address and set a password, minimizing friction until they’re ready to make a purchase. When they decide to place their first order, then you can ask them for their address, payment details, and any other necessary information. At any given point in their journey, you’re only asking them for the information you need, so they can focus on their shopping experience, rather than filling in forms.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 12px;"&gt;Similarly, when an existing customer wants to log into your site, you can make smarter decisions about how many authentication hoops you should make them jump through. For example, if they logged in successfully an hour ago on the same PC with the same IP address, and their mouse movements and typing patterns are the same as they were before, you might decide they don’t need to enter their password again. Modern CIAM systems allow businesses to fully configure the level of security required, and to specify the signals they monitor to achieve secure authentication.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 12px;"&gt;Essentially, CIAM allows you to adjust the level of friction in your authentication experience appropriately, so customers don’t feel they’re being bothered unnecessarily.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font face="Verdana" style="font-size: 12px;"&gt;Build Trust&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 12px;"&gt;When we talk about adjusting friction, the key word is “appropriately.” Zero friction is rarely the right answer from a security perspective, and it’s not always what customers want, either.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 12px;"&gt;For example, imagine you get a login request that seems to be coming from an existing customer, but the IP address shows that they are in a different country and using an unknown device. In that case, you might decide to send an MFA request to make sure the customer is who they say they are.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 12px;"&gt;Let’s say the request does come from a genuine customer. Perhaps they’re traveling overseas, and they’ve borrowed a friend’s device because their own smartphone won’t connect to the local network. In this situation, receiving an additional security challenge doesn’t feel like unnecessary friction. It’s reassuring for the customer because it shows them, you’re taking their account security seriously.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 12px;"&gt;Only asking for the authentication you need, and always asking for authentication when you need it can prove to customers that the friction added to the experience is necessary, and you’ll find it much easier to win their trust.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font face="Verdana" style="font-size: 12px;"&gt;What Are the Benefits of Improving CX with CIAM?&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 12px;"&gt;Utilizing CIAM to improve CX can unlock a variety of benefits that work together to improve business operations, reduce IT costs, and capture more revenue. Effective use of CIAM enables you to:&lt;/font&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;font face="Verdana" style="font-size: 12px;"&gt;&lt;strong&gt;&lt;font&gt;Boost Customer Acquisition and Retention:&amp;nbsp;&lt;/font&gt;&lt;/strong&gt;&lt;font&gt;Businesses can acquire more customers with CIAM and progressive profiling by streamlining the registration process, asking for information over time rather than forcing new customers to fill out a long sign-up form before checkout.&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 12px;"&gt;&lt;strong&gt;&lt;font&gt;Increase Revenue:&amp;nbsp;&lt;/font&gt;&lt;/strong&gt; &lt;font&gt;By using progressive profiling, businesses can get to know their customers better while building rich user profiles to offer tailored experiences across every digital property. Unifying customer identity with existing Customer Relationship Management and Customer Data Platforms allows businesses to finely target cross-sell and up-sell offers.&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 12px;"&gt;&lt;strong&gt;&lt;font&gt;Strengthen Customer Loyalty:&amp;nbsp;&lt;/font&gt;&lt;/strong&gt; &lt;font&gt;By enforcing appropriate security measures in the right situations, CIAM shows your customers you are a trustworthy steward of their accounts and personal data.&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 12px;"&gt;&lt;strong&gt;&lt;font&gt;Reduce Customer Support Costs:&amp;nbsp;&lt;/font&gt;&lt;/strong&gt; &lt;font&gt;Effective CIAM gives customers more options for authenticating with your site, which means they are less likely to fail security challenges or get locked out of their accounts.&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;font face="Verdana" style="font-size: 12px;"&gt;&lt;strong&gt;&lt;font&gt;Mitigate Security, Privacy, and Fraud Risks:&amp;nbsp;&lt;/font&gt;&lt;/strong&gt; &lt;font&gt;By replacing outdated perimeter-based identity checks with continuous authentication using real-time analytics, CIAM makes your customer-facing systems more secure.&lt;/font&gt;&lt;/font&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 12px;"&gt;&lt;u&gt;&lt;font&gt;Rich Keith, Senior Director, Product &amp;amp; Solution Marketing, Ping Identity&lt;/font&gt;&lt;/u&gt;&lt;span style=""&gt;&amp;nbsp;has over 20 years technical and marketing experience in cyber security, IAM, AI/ML and big data analytics, and enterprise software including enterprise Java servers and transaction processing systems. Rich is a sought-after speaker at cybersecurity events worldwide. Prior to joining Ping Identity, Rich held senior positions at SailPoint (IAM), BeyondTrust (PAM), Oracle and Cofense/PhishMe. Rich holds a master's degree in Computer Science from California State University, Chico.&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13457416</link>
      <guid>https://www.technologyfirst.org/Tech-News/13457416</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Thu, 26 Dec 2024 18:14:15 GMT</pubDate>
      <title>AI’s Next Chapter: What to Expect in 2025</title>
      <description>&lt;p&gt;&lt;font style="font-size: 16px;"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Newsletter/Jason%20Clishe%20Blog%20January%202025.png" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;As we gear up for 2025, I've been doing a lot of thinking about the advancements in generative AI over the past year. It feels like over the next twelve months we could see a shift in how we approach data, interact with AI, and ensure that we're doing it all in an ethical and responsible way. I've got some thoughts on why data quality is about to become a major focus, the ways agentic AI could change our daily interactions with technology as a whole, and why we need to make sure we're handling these systems with care. So, let's dive in and take a look at what I'm seeing on the horizon for 2025.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 16px;"&gt;It’s All About the Data&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;The phrase “data is the new oil” has been commonplace over the past decade or so, but I predict 2025 is when we’ll actually start seeing it play out. As more organizations adopt and build generative AI systems, the need to ensure those systems are ingesting good, quality data becomes increasingly important.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;The shift towards quality data isn't about having&amp;nbsp;&lt;em&gt;more&lt;/em&gt;&amp;nbsp;data; it's about having&amp;nbsp;&lt;em&gt;better&lt;/em&gt;&amp;nbsp;data. Generative AI models are only as good as the data they're trained on. In 2025, we’ll see a focus on data quality initiatives. This means organizations will be investing heavily in data cleaning, validation, and enrichment processes, moving away from simply hoarding vast quantities of information to curating high-value datasets. This commitment to quality will be a key differentiator for AI performance and the success of these systems.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;Furthermore, the role of data stewards will become increasingly crucial. These individuals (or maybe even AI agents. More on this in a moment.) will be responsible for the lifecycle management of data – from its creation and collection, through its storage and use, to its eventual archiving or removal. Good data stewardship is about more than just governance; it’s about ensuring data is accurate, consistent, secure, and used ethically and responsibly within the context of AI projects. Without solid data stewardship, the most sophisticated AI models will still struggle, leading to biased, inaccurate, or even harmful outcomes.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;One conversation I've had recently is about using AI to help employees with health insurance, like asking “What are my vision benefits?" and "What in-network eye doctors are near me?” Ingesting your health insurance policy into such a system may not seem like an arduous task. But your policies will change over time. New policies will need to be added, and expired policies will need to be removed. We can’t simply feed AI a bunch of data and call it day; we need processes for the removal of data as well. This illustrates the need for effective data lifecycle management programs.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 16px;"&gt;Agentic AI&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;The way we interact with AI systems is set to change as the popularity of agentic AI increases. But what is agentic AI?&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;Generative AI like ChatGPT, Gemini, or Claude is kind of like a chef in a kitchen. You give them an instruction, and they can whip up a delicious meal. That’s where the “generative” in generative AI comes from; they generate content. But an agentic AI system is more like the restaurant manager, that not only can create new recipes but also decide what ingredients to buy, how to set the menu, and how to coordinate the kitchen staff. Agentic AI systems are focused on goals and outcomes, and they can act autonomously to achieve those goals without human interaction.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;While agentic AI systems leverage the creativity of generative AI models such as ChatGPT, they differ in several ways. Primarily, these systems prioritize decision-making over content generation. Secondly, they operate autonomously, driven by predefined goals – like boosting revenue, improving customer feedback, or streamlining logistics – rather than requiring constant human instruction. And finally, these systems possess a more sophisticated ability to handle complex, multi-step processes, navigating data sources and initiating workflows without manual intervention.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;Because agentic AI systems are designed to carry out specific, granular tasks, they enable greater specialization of roles compared to general purpose models like ChatGPT. Some agentic systems will have an “orchestrator” which can be thought of as the main agent that interacts with and instructs all of its downstream agents. Imagine this: An AI system is monitoring a salesperson's calendar, and before each meeting, it automatically prepares a brief with information about that customer. And not just any information. Relevant information like past purchase history, previous interactions with their team, and even business trends in their industry.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 16px;"&gt;Responsible AI&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;“With great power comes great responsibility.” In 2025, organizations will no longer be able to treat ethical AI as an afterthought; it will become a core component of any AI strategy. This means proactively establishing clear policies to guide AI development, encompassing data privacy, transparency, and bias mitigation. This will require not just technical solutions but also a broader ethical commitment across all levels of an organization.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;Beyond ethical considerations, robust governance of AI systems will be critical. This includes establishing clear lines of responsibility for AI outputs, implementing testing and validation processes to ensure the reliability of AI models, and setting up clear mechanisms for recourse when things go wrong. We can’t just deploy AI and hope for the best; we have to be good stewards of it. We'll see a growing need for specialized roles, such as AI ethicists and AI risk managers, who will be tasked with ensuring that AI is used responsibly and for the benefit of all stakeholders. The path to realizing the full potential of AI is paved with careful planning, robust oversight, and a dedication to building systems that are not just powerful but also trustworthy and ethical.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;I've shared my predictions, but now I'm curious – what are&amp;nbsp;&lt;em&gt;you&lt;/em&gt;&amp;nbsp;seeing on the horizon for AI?&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 16px;"&gt;Jason Clishe&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;Jason is a Google Cloud Platform solutions architect at CDW with 30 years of IT experience spanning delivery consulting, partner enablement, and sales engineering. His expertise includes cloud technologies, generative AI, and on-premises solutions, and he leads the design of innovative generative AI solutions on GCP Vertex AI.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13444148</link>
      <guid>https://www.technologyfirst.org/Tech-News/13444148</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Mon, 23 Dec 2024 18:14:13 GMT</pubDate>
      <title>AI and the “Whopper” of Change</title>
      <description>&lt;p&gt;&lt;font style="font-size: 16px;"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Newsletter/Nathan%20Floom%20Blog%20January%202025.png" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;In 1993, Burger King became revolutionary. They implemented a groundbreaking technology that changed the game, challenging both customers and workers with a new process: accepting credit cards. In this &lt;a href="https://www.youtube.com/watch?v=SNBdrPzuicA&amp;amp;ab_channel=90s.talgic"&gt;video&lt;/a&gt; reactions were split between fear, resistance, skepticism, joy, and convenience.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;In 2024, what does AI have to do with Burger King? Everything. AI in our workplaces now represents the same disruptive factors: do I want to use AI or not? How will my employees start to use it? Will they implement it correctly? How do I even use this system? Do our workforce/customers/clients now have to make new choices?&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 16px;"&gt;¡Prohibido arrojar NADA dentro del sanitaro!&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 16px;"&gt;(It is forbidden to throw NOTHING down the toilet)&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;Just like how credit card payments date back to the late 1950s, AI’s roots trace back to the early internet in the form of 1:1 translation. In the early days of translation websites, the level of “thinking” a system could do was literal. For example, in language, "jaguar = cat," but "Jaguar ≠ car."&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;“I don’t quite agree with it, but a calculator for words is an interesting framing for ChatGPT,” &lt;a href="https://x.com/sama/status/1603592556305977345?lang=en"&gt;said&lt;/a&gt; Sam Altman, CEO of OpenAI. Thanks to technological and algorithmic advancements, AI now can see the “forest through the trees.” According to &lt;a href="https://www.techtarget.com/whatis/definition/large-language-model-LLM?Offer=abt_pubpro_AI-Insider"&gt;TechTarget&lt;/a&gt;, ChatGPT has over 1 trillion transformer neural networks, enabling it to distinguish between a luxury foreign vehicle and a jungle cat.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;With this powerful new “calculator for words,” what does that mean for the workforce? According to a recent &lt;a href="https://gitnux.org/"&gt;market-data report&lt;/a&gt;, as it stands now, six out of ten occupations have more than 30% of activities that are technically automatable. As AI advances, instead of “cash or credit,” we might soon have to ask ourselves, “human or AI?” (assuming we are even given a choice…). &amp;nbsp;Perhaps the best way to prevent AI from taking jobs is to embrace it and implement AI to do our jobs better.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 16px;"&gt;Prompt Engineering? I call it “Prompt Writing”&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;Before my career as a workforce development consultant, I was a publishing intern, editor, writing tutor, and later an English Language Learner instructor (also, janitor, cook, mosquito control specialist, property abatement worker, and road construction worker—just to name a few).&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;When I first began using AI a few years ago, two thoughts immediately struck me:&lt;/font&gt;&lt;/p&gt;

&lt;ol&gt;
  &lt;li&gt;&lt;font style="font-size: 16px;"&gt;I needed to stop using this system like a Google search.&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font style="font-size: 16px;"&gt;Creating effective prompts requires finesse.&lt;/font&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;I quickly realized that I had to do a bit of writing to get the result I wanted from AI. For me in the moment, the term “prompt writing” seemed more fitting than “prompt engineering.”&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 16px;"&gt;There is no “e” in Ketchup&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;Through research and webinars, I discovered AI was full of interesting little quirks. For instance, some AI systems would confidently assert that there is no “e” in the word &lt;em&gt;ketchup.&lt;/em&gt; Try it out today on ChatGPT, CoPilot, or Gemini &lt;u&gt;without&lt;/u&gt; logging in—you might be surprised.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;Paying attention to social media posts, I also noticed the same common AI buzzwords popping up again and again—like “dive.” &lt;em&gt;Hey, everyone, let’s dive into the topic of prompt engineering,&lt;/em&gt; followed by an emoji. We must do better to keep language fresh, interesting, and most of all “human” even when using our fancy new word calculator. By telling AI which words not to use and giving it the proper context, we can disguise its “word calculator” tone and keep our writing more authentic.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 16px;"&gt;Give AI a Job (While I Still Have Mine)&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;The “lightbulb” moment for me as an AI user was discovering the simple prompt structure of &lt;em&gt;Role-Task-Format.&lt;/em&gt; Writing a great prompt starts with giving AI a job: assign it a role. For example, tell AI: &lt;em&gt;Act as a sales rep, consultant, or data scientist.&lt;/em&gt; Giving AI the right context is essential to getting the best results.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;AI knows a lot, but it doesn’t know what’s important to you until you tell it (you don’t know what you don’t know). Next, specify the task you want it to perform: &lt;em&gt;Create a marketing email, blog post for Technology First, or session description for your Dayton AI Day presentation.&lt;/em&gt; Finally, decide on the format. Should it be 3–4 small paragraphs, a bulleted list, or something else entirely?&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 16px;"&gt;“Review the rough draft of this blog post and help me come up with a clever conclusion. Keep the writing style similar.”&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;Just as credit cards reshaped fast food transactions in 1993, AI is reshaping the workplace today. The parallels are clear: innovation challenges us to adapt, evolve, and make choices about how we engage with new technologies. Whether it’s using prompt engineering to enhance efficiency or approaching AI with a human touch, the question isn’t &lt;em&gt;if&lt;/em&gt; AI will change the game—it’s &lt;em&gt;how&lt;/em&gt; we’ll play along. I’m looking forward to meeting everyone at Dayton AI Day on Jan 15&lt;sup&gt;th&lt;/sup&gt; and hope to see you in my “Prompt Engineering…Basics and a Bit Beyond” session.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;*This blog post was written by a human…except for the conclusion paragraph. &amp;nbsp;&lt;/font&gt;&lt;/p&gt;&lt;font face="Rubik" style="font-size: 15px;"&gt;Nathan Floom is a Learning and Development Consultant in Sinclair’s Workforce Development Department. He works with a wide variety of industries to help leaders and teams become rock stars in their roles. He is a certified facilitator in Patrick Lencioni's "The 6 Types of Working Genius" and a qualified facilitator of the "AFS Global Up-Global Competence" program. In 2023, he was nominated for "Teacher of the Year" in Adult Education for the Southwest Ohio region. Nathan holds a BFA, an MA, and a certificate in Instructional Design from the Association for Talent Development. He is an Eagle Scout.&lt;/font&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13443608</link>
      <guid>https://www.technologyfirst.org/Tech-News/13443608</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Sun, 01 Dec 2024 15:00:00 GMT</pubDate>
      <title>Reflecting on 2024: Building Connections, Strengthening Tech, Championing Innovation</title>
      <description>&lt;p&gt;&lt;font face="Verdana"&gt;&lt;span data-ccp-props="{"&gt;&lt;font color="#4D5758"&gt;&lt;em&gt;&lt;span data-ccp-props="{"&gt;&lt;font style="font-size: 16px;"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Newsletter/Melissa%20Dec%20Year%20in%20Review.png" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/font&gt;&lt;/span&gt;&lt;/em&gt;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;span data-ccp-props="{"&gt;&lt;font color="#4D5758"&gt;&lt;em&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:278}"&gt;&lt;font style="font-size: 16px;"&gt;Hello Tech Community!&lt;/font&gt;&lt;/span&gt;&lt;/em&gt;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" color="#4D5758"&gt;As 2024 comes to a close, it’s incredible to reflect on how far we’ve come as a tech community. At the start of the year, many of us were focused on what lay ahead for technology—emerging trends, evolving challenges, and the innovations poised to shape our future. AI, anyone? Now, as we prepare to enter 2025, we can look back on all that’s been accomplished.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font face="Rubik" color="#4D5758"&gt;Connecting&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" color="#4D5758"&gt;This year, we strengthened connections across our tech community in profound ways. With over 50 events—including the Ohio Information Security Conference, Taste of IT, and two Digital Mixers—we created countless opportunities for professionals, students, and organizations to come together, share insights, and advance ideas. At the heart of our community are peer group meetings, a core member benefit that fosters collaboration and ensures the continuous exchange of knowledge.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" color="#4D5758"&gt;Beyond events, we facilitated one-on-one connections between members, helping businesses and individuals find the right partners, resources, and solutions to drive their goals forward. To make connecting even easier, we introduced a new mobile app, putting opportunities to engage, network, and collaborate right at your fingertips.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font face="Rubik" color="#4D5758"&gt;Strengthening&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" color="#4D5758"&gt;Throughout 2024, we’ve navigated critical topics like cybersecurity, sustainable technology, and of course AI, while continuing to champion leadership and workforce development. We tackled tough questions, such as &lt;em&gt;“What should every tech leader stop doing now?”&lt;/em&gt; and provided strategies for protecting and growing tech investments.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" color="#4D5758"&gt;We often said 2024 was our year of experimentation. So, we launched the Emerging Tech Leaders program, introduced Workshops, and hosted three conferences – challenging ourselves to push the boundaries while ensuring our programs were designed to equip participants with the skills and tools to lead and adapt in a rapidly evolving landscape. Our Women 4 Tech Conference became an annual tradition, celebrating and empowering women in technology leadership.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font face="Rubik" color="#4D5758"&gt;Championing&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" color="#4D5758"&gt;Investing in our community and the next generation of tech leaders remains at the heart of our mission. This year, we raised over $9,000 for the Technology First Scholarship Fund at the Scramble for Scholarships, awarded more than $10,000 in scholarships to regional students, and inspired the youngest learners at the Boonshoft Museum of Discovery through our interactive Tech First Brixilated Mural.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" color="#4D5758"&gt;Through initiatives like the Cyber Challenge and STEM Career Fair with the Girl Scouts, we’re introducing future leaders to careers in technology, while our Digital Mixers provided students with opportunities to connect with local employers and kickstart their tech journeys. These efforts ensure a strong pipeline of talent to sustain and grow our region’s tech community for years to come.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font face="Rubik" color="#4D5758"&gt;A Shared Commitment&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" color="#4D5758"&gt;Through it all, your commitment to advancing technology in our region has been the constant driving force behind our progress. Our community remained resilient and future-ready by focusing on sustainable practices, workforce growth, and innovative solutions. Together, we haven’t just adapted to change—we’ve led the way, positioning the Dayton region as a hub for innovation and economic growth.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" color="#4D5758"&gt;The highlight of every year, for me personally, is watching our members come together—answering a call for help, lending a hand, and encouraging career advancement. These moments exemplify the strength of our community and lay the foundation for everything we achieve together.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font face="Rubik" color="#4D5758"&gt;Looking Ahead&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" color="#4D5758"&gt;As we look forward to 2025, we’re excited to continue this journey with you. Next month, we’ll share what’s on the horizon for the new year, including opportunities to connect, learn, and lead in ways that will keep our community thriving. We invite you to kick off the year right at Dayton AI Day on January 15, where we’ll dive into the practical applications and future of artificial intelligence.&lt;br&gt;
&lt;br&gt;
But for now, let’s take a moment to celebrate all we’ve accomplished in 2024.&lt;/font&gt;&lt;/p&gt;&lt;font style="font-size: 16px;" face="Rubik" color="#4D5758"&gt;Here’s to shaping the future of tech—together.&lt;/font&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;span data-contrast="auto"&gt;&lt;font&gt;&lt;strong&gt;&lt;font color="#01507A"&gt;#UniteDaytonTech&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:240}" style="color: rgb(79, 87, 88);"&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;span data-ccp-props="{"&gt;&lt;font face="rubik, rubik_EmbeddedFont, sans-serif" color="#4D5758" style="font-size: 16px;"&gt;&lt;em&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:278}" style="background-color: rgb(255, 255, 255);"&gt;&lt;font face="rubik, rubik_EmbeddedFont, sans-serif" style="font-size: 16px;"&gt;Melissa&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/em&gt;&lt;/font&gt;&lt;/span&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13438052</link>
      <guid>https://www.technologyfirst.org/Tech-News/13438052</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Mon, 04 Nov 2024 14:41:51 GMT</pubDate>
      <title>Championing Tech:  The Value of Volunteerism</title>
      <description>&lt;p align="center"&gt;&lt;strong&gt;&lt;font style="font-size: 21px;" color="#4D5758"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/Nov%20post%20-%20volunteerism.png" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p align="center"&gt;&lt;strong&gt;&lt;font style="font-size: 21px;" color="#4D5758"&gt;Championing Tech:&amp;nbsp; The Value of Volunteerism&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#4D5758"&gt;For November's TECH CONNECT, a month dedicated to gratitude and giving, we’re highlighting three Tech First members who embody the spirit of service and community. &lt;strong&gt;Florence&lt;/strong&gt;&amp;nbsp;&lt;strong&gt;Renee Bacote&lt;/strong&gt; from the Montgomery County Board of Commissioners, &lt;strong&gt;Jill Campbell&lt;/strong&gt; with the Air Force Life Cycle Management Center, and &lt;strong&gt;Searsa Johnson&lt;/strong&gt; of CareSource are among our most dedicated volunteers, lending their time and expertise to events like the Girl Scout Cyber Challenge and programs with the Boys and Girls Club in addition to Tech First conferences and events. Their passion for making a difference shines through in every project they touch. We sat down with Bacote, Campbell and Johnson to discuss what motivates their volunteerism and to hear their advice for those looking to get more involved.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#4D5758"&gt;Read on to be inspired by their commitment to giving back!&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#01507A"&gt;How did you first get involved with Technology First, and what inspired you to start volunteering?&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#F98D43"&gt;Bacote:&lt;/font&gt;&lt;/strong&gt; &lt;font color="#4D5758"&gt;I first became involved with Technology First through my employer, Montgomery County, enrollment as an attendee of the annual Tast of IT Conference and then later as a peer member of the Women 4 Tech peer group. I have always believed that &lt;strong&gt;&lt;em&gt;volunteering can have a real impact on the lives of others in need of assistance or direction&lt;/em&gt;&lt;/strong&gt; which continues to help me realize that this impact is a part of something bigger than myself.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#6600CC"&gt;Campbell:&lt;/font&gt;&lt;/strong&gt; &lt;font color="#4D5758"&gt;There have been times in my life when I needed guidance or support and found it lacking, which has driven me to volunteer and give back to others. Volunteering offers me the &lt;strong&gt;&lt;em&gt;chance to share my skills and expertise in ways that might benefit others&lt;/em&gt;&lt;/strong&gt; and &lt;strong&gt;&lt;em&gt;make a positive difference&lt;/em&gt;&lt;/strong&gt;. I believe the knowledge exchanged through volunteering is incredibly valuable—&lt;strong&gt;&lt;em&gt;every experience adds to my growth and understanding&lt;/em&gt;&lt;/strong&gt;. Additionally, it’s rewarding to provide time and services to those who may not have access or the means to seek out this support on their own.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#01507A"&gt;What has been the most rewarding part of your volunteer experience?&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#F98D43"&gt;Bacote:&lt;/font&gt;&lt;/strong&gt; &lt;font color="#4D5758"&gt;I have really enjoyed giving my time, energy, and knowledge while &lt;strong&gt;&lt;em&gt;connecting&lt;/em&gt;&lt;/strong&gt; to others in the Dayton community. I have always enjoyed working with others and making new friends in an environment that &lt;strong&gt;&lt;em&gt;promotes growth along with helping others learn&lt;/em&gt;&lt;/strong&gt; and &lt;em&gt;&lt;strong&gt;gain professional experience&lt;/strong&gt;&lt;/em&gt;.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#01507A"&gt;Can you share a specific moment or experience that stands out to you during your time volunteering?&amp;nbsp;&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#6600CC"&gt;Campbell:&lt;/font&gt;&lt;/strong&gt; &lt;font color="#4D5758"&gt;Being sought as an expert and leader while I was facilitating a session at Taste of IT!&amp;nbsp;&amp;nbsp;It was an honor to hear &lt;em&gt;"I was told I needed to meet you."&lt;/em&gt; &amp;nbsp;To be recognized by peers as a knowledgeable leader and, in this instance, to &lt;strong&gt;&lt;em&gt;eventually have a job offer from [the volunteer interaction]&lt;/em&gt;&lt;/strong&gt;, was quite a &lt;strong&gt;&lt;em&gt;satisfying experience&lt;/em&gt;&lt;/strong&gt;!&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#01507A"&gt;What makes our volunteer community special, and why do you continue to give your time?&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#099AC6"&gt;Johnson:&lt;/font&gt;&lt;/strong&gt; &lt;strong&gt;&lt;em&gt;&lt;font color="#4D5758"&gt;Connection&lt;/font&gt;&lt;/em&gt;&lt;/strong&gt;&lt;font color="#4D5758"&gt;. My continued engagement is driven by connecting with the Technology First community and their caring and dedicated staff. It is &lt;strong&gt;&lt;em&gt;vital&lt;/em&gt;&lt;/strong&gt; to be part of a community that openly discusses cyber security and evolving technology.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#01507A"&gt;How has volunteering impacted your personal or professional life?&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#F98D43"&gt;Bacote:&lt;/font&gt;&lt;/strong&gt; &lt;font color="#4D5758"&gt;Volunteering has helped keep me keen on my communication, project planning, and teamwork skills. It has also helped me to make great connections and meet new people in the Dayton community.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#6600CC"&gt;Campbell: &amp;nbsp;&lt;/font&gt;&lt;/strong&gt;&lt;font color="#4D5758"&gt;I have been humbled by the amount of expertise I’ve been exposed to and a substantial amount of my diverse knowledge and “career wisdom” has come from the interactions with the people whom I’ve met through volunteering.&amp;nbsp; Also, it’s about the network – I can sincerely say that ALL – with the exception of TWO connections – on my LinkedIn network are people I’ve met face to face.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#01507A" face="Aptos, sans-serif"&gt;What do you see as the future of volunteerism, especially within the technology sector?&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#F98D43" face="Aptos, sans-serif"&gt;Bacote:&lt;/font&gt;&lt;/strong&gt; &lt;strong&gt;&lt;font color="#4D5758" face="Aptos, sans-serif"&gt;The future of volunteerism in the technology sector will likely see a significant &lt;em&gt;increase in digital volunteering&lt;/em&gt;, where people can use their technical skills remotely as more and more people are working in remote positions and not physically working in buildings in the community.&amp;nbsp; I still hope there will be individuals who will still want to do “in-person” volunteering.&amp;nbsp; There will &lt;em&gt;always be a need for tech professionals with specific skills like web development, graphic design, and especially cybersecurity&lt;/em&gt;, who&lt;/font&gt;&lt;/strong&gt;&lt;strong&gt;&lt;font color="#4D5758" face="Aptos, sans-serif"&gt;se&amp;nbsp;&lt;/font&gt;&lt;/strong&gt;&lt;strong&gt;&lt;font color="#4D5758" face="Aptos, sans-serif"&gt;technical knowledge can be more valuable when demonstrating or teaching these ideas in person with ability to &lt;em&gt;give hands-on instruction or experience&lt;/em&gt;. &amp;nbsp;&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#6600CC"&gt;Campbell:&lt;/font&gt;&lt;/strong&gt;&lt;font color="#6600CC"&gt;&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;&lt;/font&gt;The Dayton area seems to be skipped over in the areas of technology in regard to large events and connection to the surrounding areas. I believe the more volunteerism that occurs, the "louder" we can be, and the more connected Dayton will be.&amp;nbsp; Dayton is a vast source of technological knowledge and should not miss out on what is happening around us.&amp;nbsp; Lets all jump on the volunteering band wagon so we can participate in the opportunities that are happening!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#01507A"&gt;What advice would you give to someone who is considering volunteering but hasn’t taken the step yet?&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#099AC6"&gt;Johnson:&lt;/font&gt;&lt;/strong&gt; &lt;font color="#4D5758"&gt;What are you waiting for!?! For someone who is a true introvert and struggles with public speaking anxiety, &lt;strong&gt;&lt;em&gt;volunteering with Technology First served as a steppingstone in building my confidence&lt;/em&gt;&lt;/strong&gt;.&amp;nbsp;These volunteering opportunities provided me a safe space to practice public speaking, enhance networking skills, and re-connecting with my peers. Sign up now!&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;As we wrap up this month of gratitude, we’re reminded of the incredible impact that dedicated volunteers like Florence Renee, Jill, and Searsa have on our community. Their stories encourage us all to find ways to give back, connect, and create lasting change.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Here’s to making a difference together!&lt;/strong&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13426892</link>
      <guid>https://www.technologyfirst.org/Tech-News/13426892</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Sun, 03 Nov 2024 15:00:02 GMT</pubDate>
      <title>Turning Conference Chatter into Client Conversions: How You Can Leverage Events for Business Development</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/Nov%20post%20-%20Worthen.png" alt="" title="" border="0"&gt;&lt;/p&gt;

&lt;p&gt;Conferences. Are they just a whirlwind of half hearted networking, average coffee, and questionable after-parties? Not for me! I see conferences as a goldmine – a chance to unearth valuable insights, capture educational moments, and ultimately, boost my sales.&lt;/p&gt;

&lt;p&gt;Here's the thing: most people attend conferences, passively absorb information, and then…crickets. But the real magic happens after the event. It's about taking those nuggets of knowledge and weaving them into your sales strategy.&lt;/p&gt;

&lt;p&gt;Here's how to turn conference chatter into client conversions:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. The "Hot-off-the-Press" Pitch:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;● Identify Key Takeaways: Jot down the most impactful trends, innovative solutions, and industry challenges discussed.&lt;/p&gt;

&lt;p&gt;● Craft a Timely Narrative: Incorporate these insights into my outreach. For example, "At the recent [Conference Name], there was a lot of buzz around [hot topic]. It got me thinking about how [your company] could help businesses like yours navigate this…" Be as specific as possible about how the learnings from the conference can apply to your specific prospects environment.&lt;/p&gt;

&lt;p&gt;● Establish Thought Leadership: Sharing these timely insights positions me as an expert and demonstrates that I'm invested in staying ahead of the curve.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. Name Dropping Done Right:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;● Strategic Networking: Make a point of connecting with influential speakers and industry leaders.&lt;/p&gt;

&lt;p&gt;● Leverage Connections: In follow-up emails, you might say, "[Speaker Name] made a great point about [topic] at [Conference Name]. It resonated with me because…" This adds credibility and context to your outreach.&lt;/p&gt;

&lt;p&gt;● Build Relationships: Conferences are a breeding ground for genuine connections. These relationships can translate into warm leads and referrals down the line.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3.&lt;/strong&gt; &lt;strong&gt;Content is King (and Conferences are the Kingdom):&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;● Repurpose Content: Leverage conference presentations, workshops, and keynotes to create valuable content for my prospects. Think blog posts, social media updates, or even short videos summarizing key takeaways. Don’t be afraid to take selfies or quick videos in the hallways.&lt;/p&gt;

&lt;p&gt;● Offer Exclusive Access: Sharing exclusive insights or resources from the conference adds value to my outreach and incentivizes prospects to engage.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;4.&lt;/strong&gt; &lt;strong&gt;The Follow-Up Frenzy:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;● Strike While the Iron's Hot: Follow up with connections and leads immediately after the conference. The event is still fresh in their minds, making them more receptive to my message.&lt;/p&gt;

&lt;p&gt;● Personalize Your Approach: Reference specific conversations or shared experiences to make your outreach more meaningful.&lt;/p&gt;

&lt;p&gt;Conferences are an investment – of time, money, and energy. But by strategically leveraging the learnings and connections, I turn that investment into a sales bonanza. So, the next time you're at a conference, remember: don't just attend, capitalize!&lt;/p&gt;

&lt;p&gt;&lt;span&gt;&lt;strong&gt;About NextStep Networking:&amp;nbsp;&lt;/strong&gt;&lt;span style="background-color: rgb(255, 255, 255);"&gt;&lt;font style="font-size: 16px;" face="Rubik"&gt;NextStep Networking partners with schools to excite and empower students, businesses that make us think, non-profits that want to maximize their impact and government agencies that rely on safety and security. We will bring new ideas and find creative and innovative ways to help your business with technology. Built on a foundation of integrity and community partnership, we believe that helping other like-minded organizations prosper will pave the way to a better future. Join our mission of making a positive impact in the lives of those we serve.&lt;/font&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13426796</link>
      <guid>https://www.technologyfirst.org/Tech-News/13426796</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Fri, 01 Nov 2024 14:00:01 GMT</pubDate>
      <title>The Future of Enterprise Communications and Technology</title>
      <description>&lt;p&gt;&lt;font style="font-size: 16px;"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/Nov%20post%20-%20NexusBlue%20(1).png" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;As 2024 draws to a close, the business landscape is evolving rapidly, especially in enterprise communications, technology, and economic trends. For companies to stay competitive, it is essential to remain informed and adaptable. Below, we explore the key developments and insights that will define enterprise communications in the year ahead.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 16px;"&gt;Key Industry Trends in Enterprise Communications&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;&lt;strong&gt;AI’s Expanding Role in Customer Experience and Call Centers&lt;/strong&gt;&lt;br&gt;
Artificial intelligence (AI) continues to transform customer service and call centers by improving efficiency and personalization. Many businesses are integrating AI-powered tools to automate repetitive tasks, streamline interactions, and provide customized experiences. As AI becomes more advanced and accessible, its adoption will only grow, though the rising costs of implementation and maintenance remain a challenge. Maximizing the potential of AI requires leveraging its data across various departments—sales, marketing, and support—to create a seamless and integrated customer journey.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;&lt;strong&gt;New Compliance Regulations for Financial Services&lt;/strong&gt;&lt;br&gt;
The European Union’s Digital Operational Resilience Act (DORA) will go into effect in January 2025, impacting financial institutions and their technology providers. These firms must meet rigorous cybersecurity and operational resilience standards, requiring gap analyses, improved risk management, and resilience testing. While DORA directly affects financial services, businesses in other sectors, including enterprise communications, will also need to prioritize securing their data and systems to stay compliant across industries.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 16px;"&gt;The Evolution of Hybrid Work&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;Hybrid work models have become a permanent feature of the post-pandemic business world. Although some organizations aim for a return to full-time office work, many employees still prefer the flexibility of hybrid setups. The challenge for businesses is to sustain collaboration, productivity, and company culture in this environment. Investing in advanced video conferencing, collaboration platforms, and secure remote access tools will be critical for staying competitive and attracting talent.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 16px;"&gt;Key Timelines and Regulatory Changes&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;font style="font-size: 16px;"&gt;&lt;strong&gt;January 2025&lt;/strong&gt;: DORA compliance deadline for financial services and related industries. Ensuring cybersecurity and resilience standards are met will be vital to avoid penalties.&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 16px;"&gt;Challenges and Opportunities for Businesses&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;&lt;strong&gt;Economic Uncertainty&lt;/strong&gt;&lt;br&gt;
Inflation, layoffs, and commercial real estate challenges are contributing to an uncertain economic landscape. Businesses need to be agile, managing costs carefully while investing in technologies that will future-proof operations.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;&lt;strong&gt;Rising AI Development Costs&lt;/strong&gt;&lt;br&gt;
While AI offers considerable efficiency gains in customer service and other areas, the costs associated with its deployment and maintenance are increasing. Businesses must evaluate the long-term return on investment (ROI) of AI solutions to ensure scalability and adaptability to future needs.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;&lt;strong&gt;Evolving Communication Tools&lt;/strong&gt;&lt;br&gt;
The importance of video conferencing, collaboration platforms, and messaging apps has grown immensely. Companies should continually assess their tech stack to ensure they are using flexible, secure, and well-integrated communication tools that align with their broader business systems.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 16px;"&gt;Strategic Recommendations&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
  &lt;li&gt;&lt;font style="font-size: 16px;"&gt;&lt;strong&gt;Invest in AI Thoughtfully&lt;/strong&gt;: AI can be transformative, but strategic integration across departments is key. Focus on scalable AI solutions that deliver valuable data insights while integrating with existing technologies.&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font style="font-size: 16px;"&gt;&lt;strong&gt;Prepare for Regulatory Changes&lt;/strong&gt;: Businesses in finance and technology must align with new regulations like DORA. Regularly review cybersecurity protocols, third-party contracts, and resilience measures to avoid compliance risks.&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font style="font-size: 16px;"&gt;&lt;strong&gt;Support Hybrid Work Models&lt;/strong&gt;: Hybrid work is here to stay. To remain competitive, invest in technologies that enable employees to seamlessly transition between office and remote work, ensuring productivity and security.&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font style="font-size: 16px;"&gt;&lt;strong&gt;Optimize Communication Platforms&lt;/strong&gt;: Companies should consider consolidating communication tools that offer security, resilience, and integration with IT systems to ensure smooth operations.&lt;/font&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 16px;"&gt;Looking Ahead&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;The remainder of 2024 and early 2025 will bring both challenges and opportunities, including advances in AI and tightening regulatory landscapes. By staying informed, businesses can navigate these changes effectively. Balancing innovation with economic and regulatory readiness will be crucial for long-term success.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;At NexusBlue, we are dedicated to helping businesses make informed decisions and adapt to the ever-changing enterprise communications and technology landscape. By acting now, organizations can position themselves for sustainable success and long-term resilience.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;&lt;em&gt;&lt;strong&gt;NexusBlue&lt;/strong&gt;&lt;br&gt;
NexusBlue specializes in rescuing, fixing, and reimagining business operations through enterprise communications, digital transformation strategies, and AI assessments. We help companies navigate the complexities of technology and regulation to drive lasting ROI in today’s fast-evolving business environment.&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13426794</link>
      <guid>https://www.technologyfirst.org/Tech-News/13426794</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Tue, 01 Oct 2024 14:02:00 GMT</pubDate>
      <title>Cybersecurity Essentials for Small Businesses: A Comprehensive Guide</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/Oct%20blog%20post%20Waldman.png" alt="" title="" border="0"&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;As a business owner, it’s easy to focus on growth, customer service, and day-to-day operations while discounting cybersecurity. However, in a world where&lt;/font&gt; &lt;a href="https://www.accenture.com/us-en/insights/security/state-cybersecurity"&gt;&lt;font style="font-size: 16px;"&gt;46% of cyberattacks target small and medium-sized businesses&lt;/font&gt;&lt;/a&gt;&lt;font style="font-size: 16px;"&gt;, maintaining a secure digital environment is not just important—it’s critical for survival.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;This blog dives into the key cybersecurity practices for small and medium-sized businesses, to help you protect your organization from malicious threats and costly ransomware attacks.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why Are SMBs a Target?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;The answer lies in their limited cybersecurity infrastructure. While large corporations invest heavily in advanced security systems, smaller businesses tend to have fewer resources or budgets. However, just because your business is small doesn’t mean you have to an easy target.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Common Cyber Threats Facing SMBs&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;Understanding the types of cyber threats your business may face is the first step in building a strong defense.&lt;/font&gt; &lt;a href="https://securecyberdefense.com/6-important-best-practices-for-preparing-for-data-breaches-and-security-incidents/"&gt;&lt;font style="font-size: 16px;"&gt;Preparing for security incidents is an important business practice&lt;/font&gt;&lt;/a&gt;&lt;font style="font-size: 16px;"&gt;.&amp;nbsp; Here are the common attack methods cybercriminals use:&lt;/font&gt;&lt;/p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 16px;"&gt;1. Phishing Attacks&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

  &lt;p&gt;&lt;font style="font-size: 16px;"&gt;Phishing remains one of the most popular methods used by cybercriminals use. These attacks typically involve fraudulent emails that use urgency, deceptive visuals and links, and impersonation to trick employees into clicking on malicious links or sharing sensitive information.&lt;/font&gt;&lt;/p&gt;

  &lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 16px;"&gt;2. Ransomware&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

  &lt;p&gt;&lt;font style="font-size: 16px;"&gt;Ransomware attacks involve encrypting a company’s data and demanding a ransom to restore access. In many cases, businesses are left crippled for multiple days or weeks without access to their own information. Even after paying the ransom, there’s no guarantee the attackers will return the data.&lt;/font&gt;&lt;/p&gt;

  &lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 16px;"&gt;3. Malware&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

  &lt;p&gt;&lt;font style="font-size: 16px;"&gt;Malware is malicious software that can infiltrate your systems to damage, disable, or exploit your data. This broad category includes adware, spyware, and viruses designed to cause harm or steal valuable information.&lt;/font&gt;&lt;/p&gt;

  &lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 16px;"&gt;4. Weak Passwords and Credential Compromise&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

  &lt;p&gt;&lt;font style="font-size: 16px;"&gt;Weak, reused, or stolen passwords remain one of the biggest cybersecurity risks. A compromised credential allows an attacker to bypass security protocols and gain direct access to sensitive systems.&lt;/font&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;Small Business Cybersecurity Best Practices&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;Implementing robust cybersecurity measures doesn’t have to be overwhelming. Here are practical steps you can take to protect your business:&lt;/font&gt;&lt;/p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 16px;"&gt;1. Use Multi-Factor Authentication (MFA)&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

  &lt;p&gt;&lt;font style="font-size: 16px;"&gt;Multi-factor authentication (MFA) requires users to provide two or more verification methods—such as a password and a security code—before gaining access to the system.&lt;/font&gt;&lt;/p&gt;

  &lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 16px;"&gt;2. Regularly Update Software&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

  &lt;p&gt;&lt;font style="font-size: 16px;"&gt;Outdated software is a major vulnerability. Whether it's operating systems, web browsers, or specialized business software, keeping everything up-to-date is essential. Many updates contain patches for security flaws that have been identified.&lt;/font&gt;&lt;/p&gt;

  &lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 16px;"&gt;3. Create Strong Password Policies&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

  &lt;p&gt;&lt;font style="font-size: 16px;"&gt;Ensure your employees are using strong, unique longer passwords for each of their accounts. Implement a password policy that requires complex combinations of letters, numbers, and symbols, and encourage regular password changes.&lt;/font&gt;&lt;/p&gt;

  &lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 16px;"&gt;4. Educate Employees on Cybersecurity&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

  &lt;p&gt;&lt;font style="font-size: 16px;"&gt;Your employees are your first line of defense and greatest vulnerability. Provide regular training helps them identify current phishing scams, social engineering, and recognizing and reporting potential security breaches.&lt;/font&gt;&lt;/p&gt;

  &lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 16px;"&gt;5. Conduct Regular Risk Assessments&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

  &lt;p&gt;&lt;font style="font-size: 16px;"&gt;A risk assessment helps identify areas of vulnerability. This involves a third party evaluating your current cybersecurity practices, identifying potential threats, and implementing strategies to address them. Regular assessments help you stay ahead of evolving threats and ensure that your defenses remain effective.&lt;/font&gt;&lt;/p&gt;

  &lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 16px;"&gt;6. Backup Your Data&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

  &lt;p&gt;&lt;font style="font-size: 16px;"&gt;Data backups are critical to recovering from a cyberattack. Ensure that your business performs regular backups of all important data to an encrypted, offline location. This way, if you do experience a breach—such as a ransomware attack—you can restore your systems faster without losing significant data.&lt;/font&gt;&lt;/p&gt;

  &lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 16px;"&gt;7. Install Firewalls and Anti-Malware Software&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

  &lt;p&gt;&lt;font style="font-size: 16px;"&gt;Investing in firewalls and anti-malware software is a non-negotiable aspect of cybersecurity. A firewall monitors incoming and outgoing traffic and blocks suspicious activity, while anti-malware software detects and removes malicious software before it can do damage.&lt;/font&gt;&lt;/p&gt;

  &lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 16px;"&gt;8. Install Endpoint Protection&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

  &lt;p&gt;&lt;span style="background-color: white;"&gt;&lt;font color="#000000" style="font-size: 16px;"&gt;Every endpoint (laptop, mobile phone, tablet, etc.) that connects to the corporate network is a vulnerability, providing a potential entry point for cyber criminals. It is imperative for businesses to deploy endpoint solutions that can analyze, detect, then block and contain cyberattacks on remote systems.&lt;/font&gt;&lt;/span&gt;&lt;/p&gt;

  &lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 16px;"&gt;9. Develop an Incident Response Plan&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

  &lt;p&gt;&lt;font style="font-size: 16px;"&gt;An incident response plan outlines the steps to take in the event of a security breach. This plan includes who to contact, how to contain the breach, what to communicate, and the order of systems to be restored based on their importance for conducting business. Regularly practicing incident response through simulations helps your team respond effectively when a real threat arises.&lt;/font&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;Additional Cybersecurity Considerations for SMBs&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;While the best practices outlined above are foundational, you can further strengthen your business’s security posture by considering these additional measures:&lt;/font&gt;&lt;/p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 16px;"&gt;1. Mobile Device Management&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

  &lt;p&gt;&lt;font style="font-size: 16px;"&gt;As more employees work remotely or bring their own devices to work (BYOD), managing mobile security becomes critical. Implement mobile device management (MDM) software that enables your business to monitor, secure, and manage all employee devices that have access to company data. This allows you to enforce security policies and wipe devices remotely if they’re lost or stolen.&lt;/font&gt;&lt;/p&gt;

  &lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 16px;"&gt;2. Secure Your Wi-Fi Networks&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

  &lt;p&gt;&lt;font style="font-size: 16px;"&gt;Unsecured Wi-Fi networks are an open invitation for hackers. Ensure your business’s Wi-Fi networks are encrypted, and consider segmenting networks for employees, guests, and business systems. This prevents unauthorized access and reduces the risk of data interception.&lt;/font&gt;&lt;/p&gt;

  &lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 16px;"&gt;3. Perform Penetration Testing&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

  &lt;p&gt;&lt;font style="font-size: 16px;"&gt;Penetration testing involves simulating cyberattacks on your system to identify weaknesses before actual attackers can exploit them. Hire a cybersecurity professional to conduct these tests to provide recommendations on how to address vulnerabilities.&lt;/font&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 16px;"&gt;Free Small Business Resources&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#222222" style="font-size: 16px;"&gt;There are a number of free resources available from the federal government and the State of Ohio to reduce your risk to potential cybersecurity threats including:&lt;/font&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href="https://www.nist.gov/itl/smallbusinesscyber"&gt;&lt;font color="#000000"&gt;&lt;font color="#2F5496" style="font-size: 16px;"&gt;NIST Small Business Cybersecurity Corner&lt;/font&gt;&lt;/font&gt;&lt;/a&gt;&lt;/li&gt;

  &lt;li&gt;&lt;a href="https://www.ftc.gov/cybersecurity"&gt;&lt;font color="#000000"&gt;&lt;font color="#2F5496" style="font-size: 16px;"&gt;FTC Cybersecurity for Small Business&lt;/font&gt;&lt;/font&gt;&lt;/a&gt;&lt;/li&gt;

  &lt;li&gt;&lt;a href="https://staysafeonline.org/"&gt;&lt;font color="#000000"&gt;&lt;font color="#2F5496" style="font-size: 16px;"&gt;National Cyber Security Alliance (NCSA) Small &amp;amp; Medium Sized Business Resources&lt;/font&gt;&lt;/font&gt;&lt;/a&gt;&lt;/li&gt;

  &lt;li&gt;&lt;a href="https://www.cisa.gov/resources-tools/resources/free-cybersecurity-services-and-tools"&gt;&lt;font color="#000000"&gt;&lt;font color="#2F5496" style="font-size: 16px;"&gt;https://www.cisa.gov/resources-tools/resources/free-cybersecurity-services-and-tools&lt;/font&gt;&lt;/font&gt;&lt;/a&gt;&lt;/li&gt;

  &lt;li&gt;&lt;a href="https://ohcr.ohio.gov/"&gt;&lt;font color="#000000"&gt;&lt;font color="#2F5496" style="font-size: 16px;"&gt;https://ohcr.ohio.gov/&lt;/font&gt;&lt;/font&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Final Thoughts&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;By following these cybersecurity best practices, your company can create a strong digital defense and focus on what really matters—growth and success. Remember, being cyber aware means being cyber prepared.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;&lt;span&gt;&lt;em&gt;&lt;strong&gt;Author Bio:&amp;nbsp;&lt;/strong&gt;&lt;/em&gt;&lt;/span&gt;&lt;/font&gt;&lt;span style=""&gt;&lt;font style="font-size: 16px;"&gt;&lt;em&gt;As the CEO and Founder of Secure Cyber Defense, Shawn leads a dedicated team committed to safeguarding organizations across the entire spectrum of cybersecurity needs. From perimeter defense to secure network design, and vulnerability discovery to intrusion detection systems, Secure Cyber Defense offers comprehensive solutions tailored to meet the evolving challenges of today’s digital landscape.&lt;font face="Rubik"&gt;&amp;nbsp;&lt;/font&gt;&lt;/em&gt;&lt;/font&gt;&lt;/span&gt;&lt;em style="font-family: &amp;quot;IBM Plex Sans&amp;quot;, sans-serif;"&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;With over two decades of experience in cybersecurity and information systems, Shawn brings a wealth of expertise to the table. He specializes in leading security teams to bridge the gap between technology and business objectives, empowering informed decision-making that protects assets from both internal and external threats.&lt;/font&gt;&lt;/em&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13415385</link>
      <guid>https://www.technologyfirst.org/Tech-News/13415385</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Tue, 01 Oct 2024 14:00:01 GMT</pubDate>
      <title>Taking These 4 Preventative Steps Can Reduce Your Cyber Risk</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/Oct%20blog%20post%20Pondurance.png" alt="" title="" border="0"&gt;&lt;/p&gt;

&lt;p&gt;As Cybersecurity Awareness Month kicks off in October, it’s a great time to remind everyone at your company to practice cybersecurity awareness to protect against cyberattacks and data breaches. Of course, there’s no completely foolproof way to keep threat actors from attempting to infiltrate your network. But taking these four preventative steps can significantly reduce your cyber risk.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Use strong passwords&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Using strong passwords is an easy way to safeguard your apps and digital accounts. At Pondurance, we recommend that users choose passwords with at least 16 characters including uppercase, lowercase, numbers, and symbols. Also, we suggest that users choose a unique password for each of their accounts and never reuse their personal passwords for company accounts.&lt;/p&gt;

&lt;p&gt;Like most people, you probably have dozens of accounts with passwords, and remembering all those passwords is a difficult task. That’s where the use of a password manager comes in. A password manager program generates strong passwords, stores them, and autofills the passwords. That way, you don’t have to remember your passwords or write them down. But be sure to use a strong master password that you can easily memorize for the password manager account.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Implement MFA&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Turning on multifactor authentication (MFA) can make it especially tough for a threat actor to access your accounts. That’s because MFA requires two or more factors, such as a password, PIN, or verification code, to authenticate your identity at login. The added layer of protection may be the single most important thing you can do to defend against threat actors. Your company should have MFA implemented on every device to avoid being vulnerable to exploitation.&lt;/p&gt;

&lt;p&gt;MFA has even become a strict requirement to qualify for a cyber insurance policy. Increasingly, cyber insurers want to see that companies have MFA implemented on every device on a company’s network.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Identify phishing&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The Pondurance security operations center (SOC) team ranks phishing as the top method of credential compromise for email users. During a phishing attack, a user gets an email from someone claiming to be a known, reliable source and is fooled into providing credentials, such as passwords, credit card numbers, or bank accounts. The team reports that phishing emails with a financial lure are common fraud schemes during tax season, and malware delivery via phishing emails is an increasing threat. &lt;a href="https://www.ic3.gov/Media/PDF/AnnualReport/2023_IC3Report.pdf"&gt;FBI data&lt;/a&gt; confirms the team’s conclusions, showing that phishing/spoofing is reported over five times more often than any other type of cybercrime.&lt;/p&gt;

&lt;p&gt;In past years, phishing emails were often easy to identify due to their awkward language and poor grammar. Today, it’s not as easy to distinguish a phishing email. Artificial intelligence (AI) services, such as ChatGPT, are now making phishing emails more difficult to detect because AI helps threat actors use convincing language and proper grammar in the email text.&lt;/p&gt;

&lt;p&gt;To reduce the risk of an attack, the SOC team suggests that you set inbox rules to detect any unauthorized activity and provide user awareness training for everyone at your company. User awareness training helps your employees, executives, and board members identify phishing emails and learn how to report suspicious activity.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Make updates&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Updates fill the gaps or vulnerabilities that threat actors look to exploit in operating systems, software, and apps. Making updates can fix security bugs, protect against malware, improve performance, and more. The cybersecurity team at your company should stay informed about newly disclosed vulnerabilities and perform needed updates and patches as quickly as possible to keep threat actors out of your network.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Making cybersecurity awareness a priority at your company can help you protect against cyberattacks and data breaches. Using strong passwords, implementing MFA, identifying phishing, and making updates are four preventative steps that can significantly reduce your cyber risk during Cybersecurity Awareness Month and all year long.&lt;/p&gt;

&lt;p&gt;&lt;strong style="font-style: italic;"&gt;&lt;br&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong style="font-style: italic;"&gt;&lt;font style="font-size: 16px;"&gt;Author Bio:&amp;nbsp;&lt;/font&gt;&lt;/strong&gt;&lt;span style="background-color: white;"&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;Mike has enjoyed a career of more than forty years of operations and sales experience in the information technology and cybersecurity industry at IBM, Siemens, Sprint, and AT&amp;amp;T as well as several smaller and startup businesses. He has spent the past twelve years at Pondurance helping organizations tackle the challenges of cybersecurity to better protect their clients and their hard-earned brand reputation. Mike is active in the Central Indiana Information Systems Security Association (ISSA) chapter and is a member of InfraGard, a partnership between the FBI and members of the private sector.&lt;/font&gt;&lt;/span&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13415381</link>
      <guid>https://www.technologyfirst.org/Tech-News/13415381</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Sun, 01 Sep 2024 14:03:00 GMT</pubDate>
      <title>Emerging Tech Leaders: Unlocking Potential &amp; Paving a Path for the Future</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/ETL%20Sept%20blog%20post.png" alt="" title="" border="0"&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#4D5758"&gt;&lt;font face="Rubik"&gt;After the successful launch of Technology First's Emerging Tech Leaders program, we sat down with Coach Mike for an insightful Q&amp;amp;A. In this conversation, he delves into the inspiration behind the program, the pressing need to cultivate the next generation of IT leaders, and his thoughts on the evolving role of IT leadership in shaping the future.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#01507A" face="Rubik"&gt;Question: What inspired you to design the Emerging Tech Leaders program?&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#099AC6" face="Rubik"&gt;Coach Mike:&lt;/font&gt;&lt;/strong&gt; &lt;font color="#4D5758" face="Rubik"&gt;It was a combination of a several things, but I think they all had the same underlying theme which was the &lt;strong&gt;massive gap in leadership and people-management focus in IT&lt;/strong&gt;. We are a population of engineers and technical-minded people who have lived our lives relying on our logic and reason to solve everything. So often people are promoted into leadership positions and are never prepared or trained to digest and respond to the complexities of balancing technical decisions with the emotional needs of people and maintaining business relationships. &amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#01507A" face="Rubik"&gt;Question: What key skills and competencies do participants develop in the program?&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#099AC6" face="Rubik"&gt;Coach Mike:&lt;/font&gt;&lt;/strong&gt; &lt;font color="#4D5758" face="Rubik"&gt;Over 12 weeks and six sessions, we explore:&lt;/font&gt;&lt;/p&gt;

&lt;div style="margin-left: 2em"&gt;
  &lt;ul&gt;
    &lt;li&gt;&lt;font color="#4D5758" face="Rubik"&gt;participants’ leadership styles and values,&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;performance management and measuring success,&lt;/li&gt;

    &lt;li&gt;&lt;font color="#4D5758" face="Rubik"&gt;recruiting and onboarding,&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font color="#4D5758" face="Rubik"&gt;relationships, alliances, and politics,&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font color="#4D5758" face="Rubik"&gt;as well as looking at IT from a business perspective rather than from a technical perspective.&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;p&gt;&lt;font color="#4D5758" face="Rubik"&gt;I could probably spend six-weeks on any one of those topics, but the goal is to provide participants with exposure to experiences that we don’t talk about often or hear about but haven’t gone through. Then, help the participants understand the mechanics of each topic. Each session in the course is designed to equip attendees with insights, new tools, and various perspectives on how to navigate complex situations when they return to their roles.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#01507A" face="Rubik"&gt;Question: How does the program's interactive, scenario-based approach enhance leadership learning?&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#099AC6" face="Rubik"&gt;Coach Mike:&lt;/font&gt;&lt;/strong&gt; &lt;font color="#4D5758" face="Rubik"&gt;Consistently, people say &lt;em&gt;“I’m a hands-on learner.”&lt;/em&gt; In fact, I can’t think of a single time anyone has ever said to me &lt;em&gt;“I can’t learn anything hands-on; what I need is a good PowerPoint presentation.”&lt;/em&gt; As we cover these principles, we put participants in complex scenarios, and the scenarios compound over the program. By the end of the course, we’re able to look at a scenario and consider the results of an action, balancing the financial, emotional, and relational aspects and perspectives of our customers, teams, and leadership.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#4D5758" face="Rubik"&gt;Most of the scenarios are not meant to be “solved;” it’s not even about finding a “right” answer; instead, it’s about managing complexities and understanding the impact of decisions.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#01507A" face="Rubik"&gt;Question: Can you share an example of a scenario participants might encounter during the program?&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#099AC6" face="Rubik"&gt;Coach Mike:&lt;/font&gt;&lt;/strong&gt; &lt;font color="#4D5758" face="Rubik"&gt;We had talked about who we are as a leader and started to inspect our competencies and areas of growth, as well as how that aligned with the organization we are in. In the week this scenario was presented we were discussing performance management and measurement.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#4D5758" face="Rubik"&gt;The class was asked to consider all aspects of the scenario and put together a plan.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Emerging%20Leaders/2024/ETL%20Scenario.png" alt="" title="" border="0"&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#4D5758" face="Rubik"&gt;The point is not necessarily to solve the situation, but more to consider – and manage - all the dimensions at play. There’s no “right” answer; the appropriate or productive actions to take can vary wildly depending on the organization’s expectations and principles as well as the managers personal management style and values.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#4D5758" face="Rubik"&gt;Also worth mentioning is that this is one of seven possible scenarios that groups are given, and this is probably one of the less complex situations.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#01507A" face="Rubik"&gt;Question: What unique challenges do new and aspiring IT leaders face today, and how does the program address them?&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#099AC6" face="Rubik"&gt;Coach Mike:&lt;/font&gt;&lt;/strong&gt; &lt;font color="#4D5758" face="Rubik"&gt;IT leaders experience many of the same challenges that plague other leaders, especially ones who are leading highly specialized functions. And like other leaders, one of the most common challenges is often lack of training.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#4D5758" face="Rubik"&gt;What I see that is unique to IT is the perception that IT is nothing more than a service center for the business. Pair that with technology solutions being oversimplified and the entire vocation seemingly being “magic,” and we are often overlooked when key decisions are made. We’re brought in far too late or handed a solution which is not viable for various reasons. Our Emerging Tech Leaders program helps by addressing this potentially detrimental dynamic, putting an emphasis and awareness around building a strong professional network, building business alliances, presenting IT as a business solution in clear, relatable terms, and making the IT team easy to work with as a partner.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#01507A" face="Rubik"&gt;Question: How do peer group collaborations contribute to the learning experience?&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#099AC6" face="Rubik"&gt;Coach Mike:&lt;/font&gt;&lt;/strong&gt; &lt;strong&gt;&lt;em&gt;&lt;font color="#4D5758" face="Rubik"&gt;This is one of my favorite things about the program!&lt;/font&gt;&lt;/em&gt;&lt;/strong&gt; &lt;font color="#4D5758" face="Rubik"&gt;Having a diverse mix of industries, experience, and company sizes has proven to be very valuable, enriching our discussions. There are perspectives that people in small companies have that can influence a department leader to think more broadly, such as customer impacts. Conversely, a larger business typically has a very broad range of controls and policies that small groups may not be aware of, but either need or will need, such as IT Security or DevOps.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#4D5758" face="Rubik"&gt;Sharing perspectives on team culture, hiring practices and relationship building from various backgrounds helps broaden everyone’s understanding and approaches.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#01507A" face="Rubik"&gt;Question: How does the program help participants navigate the unique challenges of the tech industry?&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#099AC6" face="Rubik"&gt;Coach Mike:&lt;/font&gt;&lt;/strong&gt; &lt;font color="#4D5758" face="Rubik"&gt;Tech can be a bit of a black-box and sort of magical to a lot of people, so one of the biggest challenges of working in tech is trying to relate what we’re doing to objectives that make sense to others and building confidence in our business partner. Our program focuses on giving participants the tools to navigate their work culture and figure out messaging that instills trust in their organization. Inspiring trust and comradery goes much further than a lot of buzzwords and generic communication strategies that are too vague to apply to complex cultures and relationships.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#01507A" face="Rubik"&gt;Question: What advice would you give to someone considering joining the next cohort?&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#099AC6" face="Rubik"&gt;Coach Mike:&lt;/font&gt;&lt;/strong&gt; &lt;font color="#4D5758" face="Rubik"&gt;I’d advise them to just sign up! This isn’t your typical training. We don’t hand out scripts. Instead, we explore how to grow as leaders, peers, and team members.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#4D5758" face="Rubik"&gt;You’ll develop a cohort of peers, work closely with them on common goals, share insights, and solve problems together. Every session we explore lessons learned since the previous session; demonstrating how the principles we discuss influenced real actions.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#01507A" face="Rubik"&gt;Question: How do you see the role of emerging tech leaders evolving over the next few years?&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#099AC6" face="Rubik"&gt;Coach Mike:&lt;/font&gt;&lt;/strong&gt; &lt;font color="#4D5758" face="Rubik"&gt;Over the past few years, I’ve seen growth in “functional” leadership. Roles like Scrum Masters and Technical Leads as well as Senior Technologist and Architects are establishing themselves as valuable leaders to have at the table. Leadership is shifting from purely technical roles to business partners.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;&lt;font color="#4D5758" face="Rubik"&gt;Some of the best leaders I have worked for were more skilled in project management and navigating relationships than in technical disciplines.&lt;/font&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#4D5758" face="Rubik"&gt;The best organizations are moving toward enabling leaders and managers to focus on career development, coaching, organizational relationships, coordination and planning. Ultimately, organizations that embrace autonomy and self-regulation, empowering leaders to navigate and collaborate - versus a hierarchical and/or matrix structure - will be leaders in their industries, realize increased productivity and deliver more success.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;&lt;em&gt;&lt;strong&gt;Author Bio:&lt;/strong&gt;&lt;/em&gt;&amp;nbsp;&lt;em&gt;After decades in the IT industry, moving in and out of various technical and leadership positions, Coach Mike Czarnecki was introduced to a transformational leadership coach. Working with a coach changed his life and made him realize that his love of people and personal accomplishment could be more than a task that he was expected to do off the side of his desk. With nearly 30 years of experience in large, medium, and small business, as an individual contributor and leader, a full-time employee and consultant, an employee and business owner, Mike turned his passion into reality by adding IT coach to his resume.&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13402740</link>
      <guid>https://www.technologyfirst.org/Tech-News/13402740</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Sun, 01 Sep 2024 14:02:00 GMT</pubDate>
      <title>Harnessing Generational Diversity: Strategies for Building a Future-Ready Workforce</title>
      <description>&lt;p&gt;&lt;font face="Rubik"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/Cassie%20Barlow%20Sept%20blog%20post.png" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;For the first time in United States history, we have five different generations in the workplace.&lt;/font&gt;&lt;/p&gt;

&lt;div style="margin-left: 2em"&gt;
  &lt;ul&gt;
    &lt;li&gt;&lt;font face="Rubik"&gt;&lt;strong&gt;Traditionalists&lt;/strong&gt; – born 1925 – 1945&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Rubik"&gt;&lt;strong&gt;Baby Boomers&lt;/strong&gt; – born 1946 – 1964&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Rubik"&gt;&lt;strong&gt;Generation&lt;/strong&gt; &lt;strong&gt;X&lt;/strong&gt; – born 1965 – 1980&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Rubik"&gt;&lt;strong&gt;Millennials&lt;/strong&gt; – born 1981 – 2000&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Rubik"&gt;&lt;strong&gt;Generation&lt;/strong&gt; &lt;strong&gt;Z&lt;/strong&gt; – born 2001 – 2020&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;As an employer, the quicker you understand the skills and motivation each generation brings to your company &lt;font face="Rubik"&gt;the better&lt;/font&gt;. The interaction of these different generations is a valuable asset for your company. Working together, they can assist you in building the most &lt;strong&gt;productive&lt;/strong&gt; and &lt;strong&gt;innovative&lt;/strong&gt; workforce in your company's history.&amp;nbsp; Each generation has unique lived experiences - ranging from the Great Depression and WWII to the Vietnam War, September 11&lt;sup&gt;th&lt;/sup&gt;&amp;nbsp;and prolonged unrest in the Middle East, as well as many other important cultural and historical events.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;These diverse experiences lead to varying values and expectations in the workplace. For these reasons, employers face challenges in setting up compensation and benefit systems as well as creating workplace cultures that reflect the needs of all generations. This is potentially the most challenging time in history for Human Resource professionals to build effective teams and for Leaders to guide them to ultimate success.&lt;/font&gt;&lt;/p&gt;

&lt;ol style="font-family: Rubik, sans-serif;"&gt;
  &lt;li style=""&gt;&lt;strong style="font-weight: bold; font-family: Rubik;"&gt;Understanding Experiences and Expectations:&lt;/strong&gt; &lt;span style=""&gt;The first step to managing a multi-generational workforce is to understand each generation's experiences and expectations to best meet and address their needs. This infographic from Purdue highlights trends within each of the generations.&lt;/span&gt;&lt;strong&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/Generational%20Differences%20in%20the%20Workplace%20-%20Purdue%20Global%20-%20Barlow%20Sept%20Blog.png" alt="" title="" border="0"&gt;&lt;/strong&gt;&lt;/li&gt;

  &lt;li style=""&gt;&lt;strong style="font-weight: bold;"&gt;Strategy of Strengths:&amp;nbsp;&lt;/strong&gt;&lt;span style=""&gt;Once your company understands these generational differences, you can begin to build your workforce strategy in order to best incorporate the strengths of the different generations.&amp;nbsp;&lt;/span&gt;A solid workforce strategy will help ensure sustainability, healthy growth, and success. This strategy can help you identify talent and skills gaps, forecast supply and demand, and ensure that you have the right people to meet your strategic objectives. Benefits of a solid workforce strategy include reduced hiring costs, fewer talent gaps, increased retention, and better management of risk.&lt;/li&gt;
&lt;/ol&gt;

&lt;ul style="font-family: Rubik, sans-serif;"&gt;
  &lt;li&gt;There are several steps to building a workforce strategy and the process always starts with defining workforce needs based upon your strategic organizational goals. Next, analyze market trends for each need as well as your internal trends (e.g. retention, turnover). After you have defined your needs, evaluate your current talent and figure out how you can tap into other sources of manpower to fill your needs. It is always recommended that your workforce strategy is diverse and tailored to your specific company. Tap into the plethora of resources in our region including interns, new graduates, mid-senior level transfers, upskilling, and a diverse range of candidates including older adults, veterans, new Americans, reentered citizens, and people with disabilities. &lt;strong&gt;&lt;em&gt;With a robust balance of employee sources, you can ensure a strong workforce as well as a deep bench of new employees.&lt;/em&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;span style=""&gt;3. &lt;strong&gt;Monitor &amp;amp; Adjust:&lt;/strong&gt; After you develop your workforce strategy, it is crucial for your company to continue to assess your plan, your outcomes, and your success in order to make necessary adjustments to ultimately achieve your company’s goals.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=""&gt;Embrace the opportunities a diverse generational workforce presents to create a robust culture capable of tackling challenges and driving growth and success.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=""&gt;&lt;font style="font-size: 16px;"&gt;&lt;br&gt;&lt;/font&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;&lt;strong&gt;Author Bio:&lt;/strong&gt; Cassie Barlow is the President of SOCHE, a non-profit organization that collaborates with Higher Education, K-12, employers and government in order to impact economic development through education and employment.&lt;/font&gt;&lt;/em&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13402600</link>
      <guid>https://www.technologyfirst.org/Tech-News/13402600</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Sun, 01 Sep 2024 14:01:00 GMT</pubDate>
      <title>Finding Success in IT Leadership Without Deep Technical Knowledge</title>
      <description>&lt;p&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/April%20Van%20Oss%20Sept%20blog%20post.png" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;&lt;span data-contrast="auto"&gt;&lt;font&gt;I recently presented at my company’s Board of Advisors meeting. After I shared several technical slides on progress, challenges, and next steps, a trusted board member observed that, while the information was good, I am not an IT leader: I am a “Business Leader who just happens to lead the IT function.” What a valuable and validating reminder! Valuable, because you should always deliver messaging from IT using a business framework—a fact I temporarily forgot in my excitement to share the impressive work my team had accomplished. Validating, because I&lt;/font&gt;&lt;/span&gt; &lt;span data-contrast="auto"&gt;&lt;em&gt;&lt;font&gt;don't&lt;/font&gt;&lt;/em&gt;&lt;/span&gt; &lt;span data-contrast="auto"&gt;&lt;font&gt;have deep technical knowledge; but, while IT knowledge is important, you can be a great IT leader without knowing how to build a server or develop an application.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;&lt;span data-contrast="auto"&gt;&lt;font&gt;I have spent most of my corporate career leading enterprise project management offices (ePMOs).While most of those projects had an IT component, and somewhere wholly focused on IT, leading an IT group is another task entirely. By nature, the ePMO is controlled and predictable (I'm very good at planning and controlling—I often say that I am a control enthusiast ;)). But good planning and control will only take you so far in IT. The rest of the journey requires that you build a clear strategy, foster a strong leadership team, and stay aligned to the business’s mission.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;&lt;span data-contrast="auto"&gt;&lt;font&gt;When I was offered the VP of IT position at LION, I was excited about the role and knew that I could do it well. I must admit, though, that I didn't sleep much the first few months. There are many things that weigh heavily in IT: the seeming inevitability of cyber-attacks, being responsible for reliable and secure infrastructure, simply ensuring that every employee can do their job every day, and that's&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;span data-contrast="auto"&gt;&lt;em&gt;&lt;font&gt;before&lt;/font&gt;&lt;/em&gt;&lt;/span&gt; &lt;span data-contrast="auto"&gt;&lt;font&gt;the forward-looking innovation and AI activities expected from any business-focused IT group! When it comes to leadership, it is unreasonable to think that a single person would, or could, have a deep understanding of it all.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;&lt;span data-contrast="auto"&gt;&lt;font&gt;Perhaps because of this, it’s becoming common for IT leaders to have a general technical background but proven success leading teams. I believe that is due, in part, to the breadth of IT topics and the pace at which technology changes. So, while I'm still learning new things every day, I'm sleeping better at night. Here are a few things that have helped and that I would recommend to others.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;
    &lt;p&gt;&lt;font&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;&lt;span data-contrast="auto"&gt;&lt;strong&gt;&lt;font&gt;Find awesome mentors:&amp;nbsp;&lt;/font&gt;&lt;/strong&gt;&lt;/span&gt;&lt;span data-contrast="auto"&gt;&lt;font&gt;First and foremost, ask for help in the early days. Find mentors you trust, preferably outside of your organization like board members or people from your network. Take folks to lunch and ask them to share their own experiences. Listen intently and ask clarifying questions but recognize when you’ve heard enough. It’s easy to become paralyzed by a large amount of advice from great mentors, so once your brain is at capacity, trust your gut to create a cohesive strategy that meets the needs of your department. It doesn’t have to be perfect; your plan will evolve over time.&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;ul&gt;
  &lt;li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;
    &lt;p&gt;&lt;font&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;&lt;span data-contrast="auto"&gt;&lt;strong&gt;&lt;font&gt;Identify your leaders:&amp;nbsp;&lt;/font&gt;&lt;/strong&gt;&lt;/span&gt;&lt;span data-contrast="auto"&gt;&lt;font&gt;In the beginning, spend a good deal of time listening to your team. You’ll quickly learn who the natural leaders are and who is interested in a leadership position. Make a distinction between technical and people leadership, communicate the importance of both, and be sure people are in the right roles. More than anything else, identify great leaders who balance your own skills, put them in place, and trust them to do their job.&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;ul&gt;
  &lt;li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;
    &lt;p&gt;&lt;font&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;&lt;span data-contrast="auto"&gt;&lt;strong&gt;&lt;font&gt;Become a deep generalist:&lt;/font&gt;&lt;/strong&gt;&lt;/span&gt; &lt;span data-contrast="auto"&gt;&lt;font&gt;To compensate for a lack of deep technological background, embark on a journey to become a deep generalist in all things IT. Join professional networks like Technology First, keep in touch with your mentors, read industry related articles, and sign up for newsletters that will keep you up to date on technology trends.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;ul&gt;
  &lt;li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="4" data-aria-level="1"&gt;
    &lt;p&gt;&lt;font&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;&lt;span data-contrast="auto"&gt;&lt;strong&gt;&lt;font&gt;Focus on the foundation:&lt;/font&gt;&lt;/strong&gt;&lt;/span&gt; &lt;span data-contrast="auto"&gt;&lt;font&gt;Be sure you have a solid foundation on which to build your IT future. In today’s world, security is a key priority. Make sure that you have a robust cyber security posture that includes user training and awareness. If you don’t, or are unsure, hire someone to do an assessment. In addition, be sure your IT Service Management (ITSM) tool meets your needs and provides the data necessary for informed decisions. Finally, to achieve business goals, it is important to have a flexible and scalable infrastructure. Consider cloud solutions, integration software, and a data architecture that will help you quickly meet business needs.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;ul&gt;
  &lt;li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="5" data-aria-level="1"&gt;
    &lt;p&gt;&lt;font&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;&lt;span data-contrast="auto"&gt;&lt;strong&gt;&lt;font&gt;Prioritize the work:&amp;nbsp;&lt;/font&gt;&lt;/strong&gt;&lt;/span&gt;&lt;span data-contrast="auto"&gt;&lt;font&gt;As any good leader knows, there will always be twice as many things that you want to do than what you have the capacity, time, and money for! Prioritize the work and communicate the plan to your team so everyone stays focused on the most important things. I’m lucky enough to have a strong ePMO that helps us develop the project list and prioritize with consideration for business requests and overall strategy. If you aren’t as lucky, be sure to develop and communicate your own priority standard to set expectations across the board.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;&lt;span data-contrast="auto"&gt;&lt;font&gt;Stepping into the IT leadership role has been both challenging and rewarding. It has required me to shift my perspective to a broader business narrative, ensuring that IT's contributions align with the company's strategic goals. By embracing the mindset of a business leader, I've learned that successful IT leadership isn't about mastering every technical detail. It’s about guiding the team with a clear vision, fostering strong leadership within the team, and ensuring that our IT initiatives support the business's growth and resilience. Though IT is at the heart of modern business, the most important function of any IT leader is to connect the dots between technology and the business outcomes that drive success.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;&lt;em&gt;&lt;strong&gt;Author Bio:&lt;/strong&gt;&amp;nbsp;&lt;a href="https://www.linkedin.com/in/avanoss/"&gt;&lt;span data-contrast="none"&gt;&lt;font color="#467886"&gt;&lt;span data-ccp-charstyle="Hyperlink"&gt;Apryl Van Oss&lt;/span&gt;&lt;/font&gt;&lt;/span&gt;&lt;/a&gt;&amp;nbsp;&lt;span data-contrast="auto"&gt;&lt;font&gt;joined&lt;/font&gt;&lt;/span&gt; &lt;a href="https://www.lionprotects.com/"&gt;&lt;span data-contrast="none"&gt;&lt;font color="#467886"&gt;&lt;span data-ccp-charstyle="Hyperlink"&gt;LION&lt;/span&gt;&lt;/font&gt;&lt;/span&gt;&lt;/a&gt; &lt;span data-contrast="auto"&gt;&lt;font&gt;in May 2019 and accepted the position of Vice President of Information Technology in August of 2023. In this role, Apryl is committed to building a strong team that is ready to optimize LION systems and processes for organizational growth, efficiency, and innovation. Prior to joining LION, Apryl spent over 20 years working in diverse environments and has established several successful enterprise-wide Project and Portfolio Management Offices across various industries including legal, business, healthcare, insurance, and manufacturing.&lt;/font&gt;&lt;/span&gt;&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13402598</link>
      <guid>https://www.technologyfirst.org/Tech-News/13402598</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Sun, 01 Sep 2024 14:00:00 GMT</pubDate>
      <title>Empowering Tomorrow's Tech Leaders: A Vision for Workforce Development</title>
      <description>&lt;p&gt;&lt;font face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 16px;"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/Melissa%20Sept%20post.png" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 16px;"&gt;As we navigate the ever-evolving landscape of the technology industry, I am thrilled to share our organization’s unwavering commitment to workforce development. Our mission is clear: to connect, strengthen and champion the technology community.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:240}"&gt;&lt;font style="font-size: 16px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" color="#01507A"&gt;&lt;span data-contrast="auto"&gt;&lt;strong&gt;&lt;font style="font-size: 24px;"&gt;The Power of Skill Enhancement&lt;/font&gt;&lt;/strong&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:240}"&gt;&lt;font style="font-size: 24px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 16px;"&gt;In an era where innovation drives progress, investing in skill enhancement is paramount. Our programs, workshops, and leadership training initiatives empower individuals to upskill, reskill, and adapt to emerging trends. Whether it’s mastering cloud computing, honing data analytics expertise, or diving into cybersecurity protocols, we believe that continuous learning is the cornerstone of success.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:240}"&gt;&lt;font style="font-size: 16px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" color="#01507A"&gt;&lt;span data-contrast="auto"&gt;&lt;strong&gt;&lt;font style="font-size: 24px;"&gt;Bridging the Diversity Gap&lt;/font&gt;&lt;/strong&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:240}"&gt;&lt;font style="font-size: 24px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 16px;"&gt;Diversity fuels innovation. We recognize that a vibrant tech ecosystem thrives on varied perspectives, backgrounds, and experiences. Our commitment to inclusivity extends beyond mere rhetoric. Through our &lt;strong&gt;Women 4 Tech&lt;/strong&gt; conferences and peer group meetings, targeted outreach, scholarships, and partnerships with organization like &lt;strong&gt;NPower&lt;/strong&gt;, &lt;strong&gt;Sinclair College&lt;/strong&gt; and so many more, we are bridging the diversity gap. Together, we can create a tech workforce that mirrors the world we aspire to build.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:240}"&gt;&lt;font style="font-size: 16px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" color="#01507A"&gt;&lt;span data-contrast="auto"&gt;&lt;strong&gt;&lt;font style="font-size: 24px;"&gt;Nurturing Future Leaders&lt;/font&gt;&lt;/strong&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:240}"&gt;&lt;font style="font-size: 24px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 16px;"&gt;Our vision extends beyond immediate skill acquisition. We are passionate about nurturing future leaders. Our &lt;strong&gt;Emerging Tech Leaders&lt;/strong&gt; program connects seasoned professionals with aspiring talent, fostering a culture of knowledge-sharing and growth. And we celebrate the achievements of our current leaders at the annual &lt;strong&gt;Leadership Awards&lt;/strong&gt;. We also invest in the potential of those who will shape the industry’s trajectory through annual scholarships to college students.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:240}"&gt;&lt;font style="font-size: 16px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" color="#01507A"&gt;&lt;span data-contrast="auto"&gt;&lt;strong&gt;&lt;font style="font-size: 24px;"&gt;Industry-Driven&lt;/font&gt;&lt;/strong&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:240}"&gt;&lt;font style="font-size: 24px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 16px;"&gt;The tech landscape evolves swiftly, and so must our educational offerings. Our conferences, events, workshops and programs are designed in collaboration with industry leaders, ensuring that you are equipped with relevant, real-world skills. From agile development methodologies to ethical AI practices, our offerings prepare individuals to thrive in dynamic workplaces.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:240}"&gt;&lt;font style="font-size: 16px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" color="#01507A"&gt;&lt;span data-contrast="auto"&gt;&lt;strong&gt;&lt;font style="font-size: 24px;"&gt;Your Role in Our Journey&lt;/font&gt;&lt;/strong&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:240}"&gt;&lt;font style="font-size: 24px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 16px;"&gt;You play a pivotal role in our journey. Your insights, support, and advocacy drive our initiatives forward. As we embark on this exciting path of workforce development, I invite you to engage actively, share your expertise, and champion our cause. Together, we can build a resilient, adaptable workforce that propels the technology industry to new heights.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:240}"&gt;&lt;font style="font-size: 16px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 16px;"&gt;Thank you for your unwavering commitment to our shared vision. Let us continue to shape the future, one skill at a time.&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" color="#01507A"&gt;&lt;strong&gt;&lt;font style="font-size: 16px;"&gt;#UniteDaytonTech&lt;/font&gt;&lt;span data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:240}"&gt;&lt;font style="font-size: 16px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13402596</link>
      <guid>https://www.technologyfirst.org/Tech-News/13402596</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Thu, 01 Aug 2024 13:21:05 GMT</pubDate>
      <title>Sustainable Technology: Extending PC Lifecycles with Cloud Solutions</title>
      <description>&lt;p&gt;&lt;font face="Rubik" style="font-size: 18px;"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/Todd%20Wind%20blog%20(1).png" alt="" title="" border="0"&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font face="Rubik" style="font-size: 18px;" color="#01507A"&gt;Introduction&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 18px;"&gt;In today's rapidly evolving technology landscape, sustainability is a critical consideration. Balancing innovation with environmental impact is essential for organizations aiming to reduce waste and resource consumption. One area where sustainable practices can make a significant difference is in managing the lifecycle of personal computers (PCs).&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font face="Rubik" style="font-size: 18px;" color="#01507A"&gt;The Windows Dilemma&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font face="Rubik" style="font-size: 18px;" color="#01507A"&gt;Windows 10 End of life&lt;br&gt;&lt;/font&gt;&lt;/strong&gt;&lt;span style=""&gt;As Windows 10 reaches its end of life – October 2025, organizations face a challenge. Many PCs running Windows 10 won't meet the hardware requirements for Windows 11, leaving users with outdated systems. The traditional approach would be to replace these PCs with new ones, resulting in increased e-waste and unnecessary expenses.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 18px;"&gt;Instead, is it time to rethink your desktop strategy?&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font face="Rubik" style="font-size: 18px;" color="#01507A"&gt;The Alternative: Cloud-Based Solutions&lt;br&gt;&lt;/font&gt;&lt;/strong&gt;&lt;span style=""&gt;Amid the Windows 10 End of Life challenge, organizations must consider sustainable alternatives. Let’s delve into three cloud-based solutions that extend PC lifecycles and reduce e-waste:&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font face="Rubik" style="font-size: 18px;"&gt;1. Cloud PCs&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 18px;"&gt;Cloud PCs offer an innovative solution. By moving desktop environments to the cloud, organizations can extend the life of existing hardware. Here's how it works:&lt;/font&gt;&lt;/p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;span style=""&gt;●&lt;/span&gt;&lt;font face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; &lt;strong style="font-family: Verdana, Arial, Helvetica, sans-serif;"&gt;&lt;font face="Rubik"&gt;Virtual Desktops&lt;/font&gt;&lt;/strong&gt;&lt;font face="Rubik"&gt;: Microsoft's Azure and Windows 365 offer virtualized Windows desktops accessible from any device with an internet connection. With the ability to scale Cloud PCs up or down according to your needs, provide secure access from remote locations, and support key scenarios like bring-your-own-device (BYOD) programs, Windows 365 helps lower environmental impact [1].&lt;/font&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font face="Rubik" style="font-size: 18px;"&gt;2. Thin Client and Virtual Desktops&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;span style=""&gt;●&lt;/span&gt;&lt;font face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; &lt;strong style="font-family: Verdana, Arial, Helvetica, sans-serif;"&gt;&lt;font face="Rubik"&gt;Thin client such as IGEL OS&lt;/font&gt;&lt;/strong&gt;&lt;font face="Rubik"&gt;: Instead of replacing hardware, consider loading a thin client like IGEL OS onto existing devices. IGEL OS is a lightweight, read-only operating system designed for secure access to virtual desktops and applications. It extends the life of older PCs by repurposing them as thin clients, reducing e-waste and saving costs.&lt;/font&gt;&lt;/p&gt;

  &lt;p&gt;&lt;span style=""&gt;●&lt;/span&gt;&lt;font face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; &lt;strong style="font-family: Verdana, Arial, Helvetica, sans-serif;"&gt;&lt;font face="Rubik"&gt;Virtual Desktop Infrastructure (VDI)&lt;/font&gt;&lt;/strong&gt;&lt;font face="Rubik"&gt;: Implementing VDI solutions allows users to access their desktops and applications remotely. By centralizing management and security, organizations can reduce the need for resource-intensive agents on individual endpoints.&lt;/font&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font face="Rubik" style="font-size: 18px;" color="#01507A"&gt;Benefits of Sustainable Approaches&lt;br&gt;&lt;/font&gt;&lt;/strong&gt;&lt;span style=""&gt;While virtual desktops are not a new concept, there’s a common perception that they’re an expensive solution. However, this doesn’t have to be the case. As we come full circle, let’s explore additional benefits of adopting a new desktop strategy:&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=""&gt;1.&lt;/span&gt;&lt;font face="Times New Roman"&gt;&amp;nbsp;&lt;/font&gt;&lt;strong style="font-family: Verdana, Arial, Helvetica, sans-serif;"&gt;&lt;font face="Rubik"&gt;Cost Savings&lt;/font&gt;&lt;/strong&gt;&lt;font face="Rubik"&gt;: Avoid unnecessary hardware purchases and reduce IT management costs associated with maintaining multiple endpoints.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=""&gt;2.&lt;/span&gt;&lt;font face="Times New Roman"&gt;&amp;nbsp;&lt;/font&gt;&lt;strong style="font-family: Verdana, Arial, Helvetica, sans-serif;"&gt;&lt;font face="Rubik"&gt;Environmental Impact&lt;/font&gt;&lt;/strong&gt;&lt;font face="Rubik"&gt;: By extending PC lifecycles, we decrease e-waste and contribute to a more sustainable future.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=""&gt;3.&lt;/span&gt;&lt;font face="Times New Roman"&gt;&amp;nbsp;&lt;/font&gt;&lt;strong style="font-family: Verdana, Arial, Helvetica, sans-serif;"&gt;&lt;font face="Rubik"&gt;Security&lt;/font&gt;&lt;/strong&gt;&lt;font face="Rubik"&gt;: Read-only operating systems like IGEL OS enhance security by minimizing attack surfaces and reducing vulnerabilities.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;&lt;strong&gt;&lt;font face="Rubik" color="#01507A"&gt;Conclusion&lt;/font&gt;&lt;/strong&gt;&lt;font face="Rubik"&gt;&lt;br&gt;
As IT leaders, CIOs, and IT managers, embracing sustainable technology practices is not only responsible but also economically advantageous. By leveraging cloud-based solutions and repurposing existing hardware, organizations can extend the life of PCs, reduce costs, and contribute to a greener planet.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;&lt;font face="Rubik"&gt;Remember, the future of technology lies in our hands—let's make it a sustainable one!&lt;/font&gt; &lt;font face="Segoe UI Emoji, sans-serif"&gt;️&lt;/font&gt; &lt;font face="Rubik"&gt;[1]&amp;nbsp; [2].&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;font face="Rubik" style="font-size: 18px;"&gt;Disclaimer: The information provided in this article is for educational purposes only. Always consult with your organization's IT experts before implementing any changes.&lt;/font&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font face="Rubik" style="font-size: 18px;"&gt;References:&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
  &lt;li&gt;&lt;a href="https://blogs.windows.com/windowsexperience/2024/04/22/reducing-the-environmental-impact-of-windows-devices/"&gt;&lt;font style="font-size: 14px;"&gt;&lt;font face="Rubik"&gt;Reducing the environmental impact of Windows devices&lt;/font&gt;&lt;/font&gt;&lt;/a&gt;&lt;/li&gt;

  &lt;li&gt;&lt;a href="https://blogs.microsoft.com/blog/2021/07/14/microsoft-cloud-for-sustainability-empowering-organizations-on-their-path-to-net-zero/"&gt;&lt;font style="font-size: 14px;"&gt;&lt;font face="Rubik"&gt;Microsoft Cloud for Sustainability: Empowering organizations on their path to net zero&lt;/font&gt;&lt;/font&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;Source: Conversation with Copilot, 7/25/2024&lt;br&gt;

&lt;ol&gt;
  &lt;li&gt;&lt;font style="font-size: 14px;"&gt;&lt;span style=""&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://blogs.windows.com/windowsexperience/2024/04/22/reducing-the-environmental-impact-of-windows-devices/"&gt;&lt;font face="Rubik"&gt;Reducing the environmental impact of Windows devices&lt;/font&gt;&lt;/a&gt;&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;a href="https://blogs.microsoft.com/blog/2021/07/14/microsoft-cloud-for-sustainability-empowering-organizations-on-their-path-to-net-zero/"&gt;&lt;font style="font-size: 14px;"&gt;&lt;font face="Rubik"&gt;Microsoft Cloud for Sustainability: Empowering organizations on their ...&lt;/font&gt;&lt;/font&gt;&lt;/a&gt;&lt;/li&gt;

  &lt;li&gt;&lt;a href="https://blogs.windows.com/windowsexperience/2022/09/21/tech-trends-windows-pcs-help-microsoft-meet-its-commitments-to-sustainability/"&gt;&lt;font style="font-size: 14px;"&gt;&lt;font face="Rubik"&gt;Tech Trends: Windows PCs help Microsoft meet its commitments to ...&lt;/font&gt;&lt;/font&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;&lt;em&gt;&lt;strong&gt;&lt;font face="Rubik"&gt;Author Bio&lt;/font&gt;&lt;/strong&gt;&lt;font face="Rubik"&gt;: Todd Wind has 13 years in the technology consulting industry serving the Cincinnati/Dayton business community.&amp;nbsp;At CPC, Todd focuses on helping clients deliver a fast, secure, reliable, and consistent experience to their employees as they access the applications and data needed to run the business.&amp;nbsp;&lt;/font&gt;&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13389419</link>
      <guid>https://www.technologyfirst.org/Tech-News/13389419</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Thu, 01 Aug 2024 13:17:06 GMT</pubDate>
      <title>Innomark Communications Promoting Sustainable Tech in Upcoming Facility</title>
      <description>&lt;p&gt;&lt;font face="Rubik"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/Greg%20Frimming%20blog%20post.png" alt="" title="" border="0"&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 15px;"&gt;In 2023, Innomark Communications began working with a skilled team of architects and energy consultants to design a 96,480 sq. ft. building that maximizes efficiency and promotes sustainability in all aspects.&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;strong&gt;&lt;font style="font-size: 15px;"&gt;Why Wi-Fi6?&lt;/font&gt;&lt;/strong&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 15px;"&gt;Innomark’s IT team decided to roll out Wi-Fi6 at this facility for increased capability, as well as energy-efficient features. One advantage of upgrading is faster connection speeds, which means better upload and download speeds and handling large amounts of network traffic more efficiently(&lt;/font&gt;&lt;/span&gt;&lt;a href="https://www.intel.com/content/www/us/en/gaming/resources/wifi-6.html"&gt;&lt;span data-contrast="none"&gt;&lt;font style="font-size: 15px;"&gt;&lt;span data-ccp-charstyle="Hyperlink"&gt;Intel&lt;/span&gt;&lt;/font&gt;&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 15px;"&gt;). This facility will house digital printing and finishing equipment, as well as a team of 64 operators, pre-media professionals, planners, quality assurance experts, shipping and packing associates, and executive leaders. To continue high-quality production, and collaborate across departments, our team needs reliable and fast connectivity throughout the entire plant. Wi-Fi6 is going to allow us to continue to grow our digital printing capabilities and maintain clear communication through our internal team and with clients.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 15px;"&gt;Another important feature of this upgrade is improved security, specifically a system that implements increased password security. “&lt;/font&gt;&lt;/span&gt;&lt;span data-contrast="none"&gt;&lt;font style="font-size: 15px;"&gt;This authentication method helps make passwords harder to crack by using a more sophisticated method of establishing the handshake with the Wi-Fi network. This added layer of security, coupled with stronger encryption, means Wi-Fi will have more robust security options than ever”&lt;/font&gt;&lt;/span&gt; &lt;span data-contrast="auto"&gt;&lt;font style="font-size: 15px;"&gt;(&lt;/font&gt;&lt;/span&gt;&lt;a href="https://www.intel.com/content/www/us/en/gaming/resources/wifi-6.html"&gt;&lt;span data-contrast="none"&gt;&lt;font style="font-size: 15px;"&gt;&lt;span data-ccp-charstyle="Hyperlink"&gt;Intel&lt;/span&gt;&lt;/font&gt;&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 15px;"&gt;).&lt;/font&gt;&lt;/span&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 15px;"&gt;Cyber security is an important training topic at Innomark Communications. Currently, network and data transfer security is ensured through a combination of stringent firewalls, protocols, and SSL encryption. Wi-Fi6 will only add to the tools Innomark already has in place to maintain technology security.&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 15px;"&gt;Wi-Fi6 can also potentially increase battery life on devices. With Target Wake Time (TWT) technology, there is an efficient communication between the router and device regarding when to sleep and wake up (&lt;/font&gt;&lt;/span&gt;&lt;a href="https://www.intel.com/content/www/us/en/gaming/resources/wifi-6.html"&gt;&lt;span data-contrast="none"&gt;&lt;font style="font-size: 15px;"&gt;&lt;span data-ccp-charstyle="Hyperlink"&gt;Intel&lt;/span&gt;&lt;/font&gt;&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 15px;"&gt;). Devices will spend less time and energy searching for a wireless signal, which can enhance battery life. This makes Wi-Fi6 a more sustainable option than previous wireless standards.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;strong&gt;&lt;font style="font-size: 15px;"&gt;LED Lighting&amp;nbsp;&lt;/font&gt;&lt;/strong&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 15px;"&gt;Along with our upcoming facility, all Innomarkfacilities had high-efficiency LED lighting installed to replace less efficient fluorescent fixtures and high bay warehouse and shop lighting. The decision to incorporate LED lighting and other energy-efficient equipment (HVAC/ humidity control systems, roofing materials, and advanced insulation) is a projected savings of 30.4% in the new Digital Facility alone. The neighboring facility, Innomark’s 62,000 sq.ft. Litho Print operation, reduced their annual electricity usage for lighting by 65%.&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;strong&gt;&lt;font style="font-size: 15px;"&gt;Recycling &amp;amp; Disposal of Old Technology&lt;/font&gt;&lt;/strong&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 15px;"&gt;The Ohio EPA encourages business to recycle electronic equipment no longer in use because it can contain hazardous materials (&lt;/font&gt;&lt;/span&gt;&lt;a href="https://dam.assets.ohio.gov/image/upload/epa.ohio.gov/Portals/32/pdf/Electronic_Equipment_Guidance.pdf"&gt;&lt;span data-contrast="none"&gt;&lt;font style="font-size: 15px;"&gt;&lt;span data-ccp-charstyle="Hyperlink"&gt;Ohio.gov&lt;/span&gt;&lt;/font&gt;&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast="none"&gt;&lt;font style="font-size: 15px;"&gt;&lt;span data-ccp-charstyle="Hyperlink"&gt;)&lt;/span&gt;&lt;/font&gt;&lt;/span&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 15px;"&gt;.&amp;nbsp; Innomark works with certified Ohio organizations to recycle old technology, through re-use or proper disposal. From used batteries to old laptops and monitors, our IT team handles disposal in the responsible way and continues to track our recycling habits and hazardous waste. This assists with the company’s adherence to the environmental commitments of its customers.&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;strong&gt;&lt;font style="font-size: 15px;"&gt;Innomark Takeaways&amp;nbsp;&lt;/font&gt;&lt;/strong&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 15px;"&gt;After specifically designing this facility with sustainability in mind, the Innomark Management Team has taken a closer look at how we can implement these processes at other locations. Sustainable technology can be a starting point in decreasing a company’s carbon footprint.&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;span style=""&gt;&amp;nbsp;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=""&gt;&lt;font face="Rubik"&gt;&lt;br&gt;&lt;/font&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;font face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;strong&gt;&lt;font style="font-size: 15px;"&gt;Author Bio:&amp;nbsp;&lt;/font&gt;&lt;/strong&gt;&lt;/span&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 15px;"&gt;Greg Frimming is the Director of Information Technology for Innomark Communications with over 27 years of IT experience. He has a passion for all things technology and has many family members who also work in IT. Greg is a Miami University graduate, specializing in Cybersecurity.&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/em&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13389414</link>
      <guid>https://www.technologyfirst.org/Tech-News/13389414</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Mon, 01 Jul 2024 14:00:02 GMT</pubDate>
      <title>Economic impact of CMMC on Small Businesses and MSPs</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/Ken%20Fanger%20blog.png" alt="" title="" border="0"&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 16px;"&gt;The Cybersecurity Maturity Model Certification (CMMC) framework, developed by the Department of Defense (DoD), is designed to enhance the protection of controlled unclassified information (CUI) within the Defense Industrial Base (DIB) sector. This requirement is expected to be enforced starting in Quarter 1 of 2025, with a roll out of 5 years and having one-fifth of all DoD contacts requiring CMMC each year. We will explore the various facets of how CMMC compliance can impactyour company's economic health.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:278}"&gt;&lt;font style="font-size: 16px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;strong&gt;&lt;font style="font-size: 16px;"&gt;How do I know if I need CMMC?&lt;/font&gt;&lt;/strong&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:278}"&gt;&lt;font style="font-size: 16px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 16px;"&gt;All DoD contractors, sub-contractors, and support companies will be required to be at least CMMC level one. This isdetermined if the company has any Federal Contract Information (FCI). Then most contractors, sub-contractor, and support companies that have access to Controlled Unclassified Information (CUI)are requiredto be CMMC level 2. There is also level 3 compliance, but this is more limited and has much higher security and data control requirements.&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:278}"&gt;&lt;font style="font-size: 16px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;strong&gt;&lt;font style="font-size: 16px;"&gt;The Cost of CMMC&lt;/font&gt;&lt;/strong&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:278}"&gt;&lt;font style="font-size: 16px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 16px;"&gt;Achieving CMMC compliance involves significant upfront investments. Companies need to assess their current cybersecurity posture, identify gaps, and implement necessary controls. This may include upgrading IT infrastructure, purchasing new security software, changing current corporate culture, and hiring cybersecurity experts. These expenses can be substantial, especially for small and medium-sized enterprises (SMEs). In addition, any company that is supporting a DoD contractor or subcontractor needs to be CMMC compliant. This includes Managed Service Providers that support the companies.&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:278}"&gt;&lt;font style="font-size: 16px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 16px;"&gt;The cost to be prepared for a CMMC assessment can range anywhere from $20,000 up to the $100,000s, depending on the scope of the project. This is why it is critical to have a good scope of what is required to be protected. Such scoping projects need to be the first step to compliance and cost management.&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:278}"&gt;&lt;font style="font-size: 16px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 16px;"&gt;In addition to the upfront cost, there is the cost of the assessment itself. This needs to be done by an independent third party known as a C3PAO (Certified Third-Party Assessor Organization). These costs can range from $15,000 up to the $100,000s depending on the scope and size of the company being assessed. The larger the scope, the greater the expected cost.&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:278}"&gt;&lt;font style="font-size: 16px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 16px;"&gt;Then there is the ongoing cost of compliance. A company should expect ongoing costs of CMMC. These costs include maintenance of security environments, any secure cloud environments, and physical environments. These costs should be expected to be anywhere from $1,000 to $5,000 per month per user depending on needs, scope, and amount of CUI (Controlled Unclassified Information) being protected.&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:278}"&gt;&lt;font style="font-size: 16px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;strong&gt;&lt;font style="font-size: 16px;"&gt;The Cost of Non-Compliance&lt;/font&gt;&lt;/strong&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:278}"&gt;&lt;font style="font-size: 16px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 16px;"&gt;If a company decides not to go after a CMMC compliance, they will not be able to go after DoD contracts in the future. It will also remove sub-contractors and support companies from being able to service those contracts and companies. For companies heavily reliant on defense contracts, failing to achieve CMMC certification can be economically devastating.&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:278}"&gt;&lt;font style="font-size: 16px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 16px;"&gt;If you are an MSP or IT service provider to DoD-contracted companies, DoD rule 32, CFR 170, Section 170.19,paragraph 5 states, “If an OSA (Organization Seeking Assessment) utilizes an ESP(External Service Provider), other than a Cloud Service Provider (CSP), the ESP must have a CMMC certification level equal to or greater than the certification level the OSA is seeking.” The Cyber AB has confirmed that MSPs do fall under the ESP standard.&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:278}"&gt;&lt;font style="font-size: 16px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;strong&gt;&lt;font style="font-size: 16px;"&gt;The Value of CMMC&lt;/font&gt;&lt;/strong&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:278}"&gt;&lt;font style="font-size: 16px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 16px;"&gt;Though CMMC has a high initial investment cost and a substantial continuation cost, there are many advantages to having a CMMC certification. Because of its high cost,it creates a barrier to entry for competitors, giving your company an advantage in the marketplace. It is also possible to increase your costs to the government at a rate that is reasonable to the increased burden on your company.&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:278}"&gt;&lt;font style="font-size: 16px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;&lt;span&gt;&lt;em&gt;&lt;span data-contrast="auto" style="background-color: rgb(255, 255, 255);"&gt;&lt;span style=""&gt;&lt;font color="#000000"&gt;&lt;span&gt;&lt;span style="font-weight: 400; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif;"&gt;Bio&lt;/span&gt;:&lt;/span&gt;&lt;/font&gt;&lt;/span&gt;&lt;/span&gt;&lt;/em&gt;&lt;/span&gt; &lt;span data-contrast="auto" style="background-color: rgb(255, 255, 255);"&gt;&lt;em&gt;&lt;font color="#000000"&gt;Ken Fanger is a CMMC Registered Practitioner and has been working on CMMC compliance since 2019. If you would like to learn more about CMMC or request our CMMC Explained, please reach out here:&lt;/font&gt;&lt;/em&gt;&lt;/span&gt; &lt;a href="https://ontechnologypartners.com/dod-contractor-contact-form/"&gt;&lt;font&gt;&lt;span data-contrast="none"&gt;&lt;em&gt;&lt;font color="#467886"&gt;&lt;span data-ccp-charstyle="Hyperlink"&gt;https://ontechnologypartners.com/dod-contractor-contact-form/&lt;/span&gt;&lt;/font&gt;&lt;/em&gt;&lt;/span&gt;&lt;/font&gt;&lt;/a&gt;&lt;span data-contrast="none" style="background-color: rgb(255, 255, 255);"&gt;&lt;em&gt;&lt;font color="#000000"&gt;.&lt;/font&gt;&lt;/em&gt;&lt;/span&gt; &lt;span data-contrast="auto" style="background-color: rgb(255, 255, 255);"&gt;&lt;em&gt;&lt;font color="#000000"&gt;Follow Ken on LinkedIn here:&lt;/font&gt;&lt;/em&gt;&lt;/span&gt; &lt;a href="https://www.linkedin.com/in/ken-fanger-42502b5/"&gt;&lt;font&gt;&lt;span data-contrast="none"&gt;&lt;em&gt;&lt;font color="#467886"&gt;&lt;span data-ccp-charstyle="Hyperlink"&gt;https://www.linkedin.com/in/ken-fanger-42502b5/&lt;/span&gt;&lt;/font&gt;&lt;/em&gt;&lt;/span&gt;&lt;/font&gt;&lt;/a&gt;&lt;span data-contrast="auto" style="background-color: rgb(255, 255, 255);"&gt;&lt;em&gt;&lt;font color="#000000"&gt;.&lt;/font&gt;&lt;/em&gt;&lt;/span&gt;&lt;/font&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13377368</link>
      <guid>https://www.technologyfirst.org/Tech-News/13377368</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Mon, 01 Jul 2024 14:00:01 GMT</pubDate>
      <title>C-Suite Spending on IT is an Investment – NOT a Drain</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/Don%20Hopkins%20blog.png" alt="" title="" border="0"&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 16px;"&gt;For information technology (IT) to be considered a valuable investment by the C-Suite, it must be strategically aligned with the business’s key objectives. IT expenditures that do not align with these objectives become a financial drain.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font style="font-size: 16px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 16px;"&gt;Simply aligning IT with the business is not enough. The IT investments must deliver the promised results and provide appropriate returns on investment (ROI). Achieving this requires a closed-loop process. The IT organization must maintain a relationship with the C-Suite, allowing visibility into both current and future business objectives. This ongoing conversation necessitates trust and a high level of IT competency.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font style="font-size: 16px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 16px;"&gt;One challenge with alignment is the diverse perspectives within the C-Suite. While all are focused on advancing the business and guided by the same objectives, each executive views the path to success through the lens of their specific function. This diversity requires the IT organization to have a robust prioritization mechanism.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font style="font-size: 16px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 16px;"&gt;This prioritization is typically managed through the IT portfolio management process, which assesses projects based on business impact (e.g., alignment with key business objectives, payback period, ROI) and implementation difficulty (e.g., risks, likelihood of success). After agreeing on a prioritized list of projects, the IT organization must match available resources and investment capacity to these projects. It is crucial that all proposed investments are cost-efficient and perceived as reasonable by the C-Suite.&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font style="font-size: 16px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 16px;"&gt;Building relationships and trust with the C-Suite is vital. When C-Suite members perceive IT estimates as too high, it is often due to a lack of understanding of the required integration with legacy systems or the extent of change management needed. Therefore, accurate and comprehensible estimates are essential.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font style="font-size: 16px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 16px;"&gt;During project prioritization, it is important to establish clear metrics for success. Success extends beyond mere implementation; it includes delivering the projected business value. The IT organization’s commitment to the C-Suite must be fulfilled. As an example, a CEO at NCR would always ask, “If I give you a dollar today, when will you return it to me?” He wanted an answer of less than a year, though he made exceptions for larger projects, emphasizing accountability for business value return.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font style="font-size: 16px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 16px;"&gt;The IT organization must have a process to evaluate investments six months to a year post-implementation, ensuring that the returns are meeting expectations. These returns can manifest as cost savings, reduced time to market, improved customer satisfaction, or increased revenue, all contributing to the entity’s bottom line. This process is often referred to as business value management.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font style="font-size: 16px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 16px;"&gt;In summary, success in collaborating with the C-Suite hinges on building relationships and fulfilling commitments. IT organizations need to understand key business objectives, align their investments accordingly, prioritize investments based on C-Suite directions, successfully implement projects, and ensure these projects deliver the expected business value. Consistently delivering business value to the C-Suite will dispel the notion of IT investment as a financial drain.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font style="font-size: 16px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;span data-ccp-props="{"&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;&lt;em&gt;&lt;span data-contrast="auto" style="background-color: rgb(255, 255, 255);"&gt;&lt;span&gt;&lt;font style="font-size: 16px;"&gt;Bio&lt;/font&gt;&lt;/span&gt;&lt;/span&gt;&lt;span data-contrast="auto" style="background-color: rgb(255, 255, 255);"&gt;&lt;font style="font-size: 16px;"&gt;&lt;span&gt;:&lt;/span&gt; Don Hopkins is the Interim Dean of Raj Soin College of Business at Wright State University and former Chief Information Officer at NCR, SunGard Availability Services and International Game Technology. He also served as Vice President of Global Procurement and Supply Chain Management at both NCR and SunGard Availability Services and International Game Technology.&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:278}" style="background-color: rgb(255, 255, 255);"&gt;&lt;font style="font-size: 16px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/em&gt;&lt;/font&gt;&lt;/span&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13377366</link>
      <guid>https://www.technologyfirst.org/Tech-News/13377366</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Mon, 01 Jul 2024 14:00:00 GMT</pubDate>
      <title>Mentoring Saves You Money</title>
      <description>&lt;p&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/Shannon%20Sheehy%20blog.png" alt="" title="" border="0"&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;&lt;span data-contrast="none"&gt;&lt;font color="#222222"&gt;Finding qualified tech talent, especially at the junior level, can be a tough task. Employers are often spammed with resumes from candidates, and it can be difficult to filter through resumes and determine which applicants actually know their stuff. Talent teams are already spending countless hours trying to narrow down the applicant pool for higher level positions, and these entry level roles can add undue stress.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&lt;font color="#222222"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;&lt;span data-contrast="none"&gt;&lt;font color="#222222"&gt;What’s a hiring manager to do?&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&lt;font color="#222222"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;&lt;span data-contrast="none"&gt;&lt;font color="#222222"&gt;Establishing a pipeline of junior level talent by creating a community of mentorship is not only financially beneficial for companies, but provides a more qualified, and often diverse, talent pool for years to come. The creation of a mentorship program also challenges development teams to make clear processes for onboarding new hires, which can help explain the work in a more concise, consistent way for employees across all levels. This results in new hires who are onboarded more quickly and efficiently, and who can begin making an impact much sooner.&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&lt;font color="#222222"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;&lt;span data-contrast="none"&gt;&lt;strong&gt;&lt;font color="#222222"&gt;How Can this Pipeline be Established?&lt;/font&gt;&lt;/strong&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&lt;font color="#222222"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;&lt;span data-contrast="none"&gt;&lt;font color="#222222"&gt;For example, Code:Youprovides free training to adults aiming to transition into tech-related careers, and an integral piece of the program are the volunteer mentors who help students navigate their learning journeys. Qualified professionals who are already in the tech field work with students to help with troubleshooting, knowledge checks, and learning what it’s like to actually work in the tech field. Mentors get to watch their students succeed and build lasting relationships with them. This set-up has allowed for a life cycle of giving back, with former students coming back to mentor the program once they are more established in the industry.&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&lt;font color="#222222"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;&lt;span data-contrast="none"&gt;&lt;font color="#222222"&gt;Companies can intentionally structure their own development teams around mentoring by creating internal pipelines. Senior devs can mentor mid and junior folks, while mid-level employees looking to flex their leadership skills can mentor juniors or interns. By structuring their code, deployment process, and documentation around mentoring, companies can come up with processes that are easy to learn and explain for folks at all levels. This leads to clean code and well documented projects that anyone can contribute to, but requires a team buy-in to build out successfully.&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&lt;font color="#222222"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;&lt;span data-contrast="none"&gt;&lt;strong&gt;&lt;font color="#222222"&gt;Get First Pick of Talent&lt;/font&gt;&lt;/strong&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&lt;font color="#222222"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;&lt;span data-contrast="none"&gt;&lt;font color="#222222"&gt;For example, at Code:You, mentors work with the same group of students for up to 20 weeks, allowing them to get to know their work ethics, skills, and unique backgrounds and interests. This relationship gives mentors the ability to pinpoint students who not only know their stuff on a technical level, but whose background and transferable skills would be a good fit for their company. Instead of sifting through a pile of faceless resumes, they have a pool of qualified talent at their fingertips, saving both time and money in their hiring process. Companies can mimic this model by bringing on early level talent for internships and using established mid to senior level talent to mentor and foster that talent.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&lt;font color="#222222"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;&lt;span data-contrast="none"&gt;&lt;strong&gt;&lt;font color="#222222"&gt;Strengthen Your Team&lt;/font&gt;&lt;/strong&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&lt;font color="#222222"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;&lt;span data-contrast="none"&gt;&lt;font color="#222222"&gt;Providing a strong mentor experience can allow companies to train students or potential employees in skills important to them. Instilling best practices from the get-go can allow for a shorter onboarding period and learning curve once a new hire starts, allowing them to make a more immediate impact.&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&lt;font color="#222222"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;&lt;span data-contrast="none"&gt;&lt;font color="#222222"&gt;Latecomers to tech can also be an excellent asset for your team, because they often bring other skillsets and/or industry knowledge to the table.&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&lt;font color="#222222"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;&lt;span data-contrast="none"&gt;&lt;strong&gt;&lt;font color="#222222"&gt;Sharpening Your Team’s Skills&lt;/font&gt;&lt;/strong&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&lt;font color="#222222"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;&lt;span data-contrast="none"&gt;&lt;font color="#222222"&gt;Mentors are helping the next generation of tech talent grow into full-fledged junior developers. A mentor does not need to be an expert developer or have prior teaching experience. In fact, self-taught developers who are around the mid-level tend to be some of the best, because they know where students are coming from, and can provide a similar perspective. These leadership experiences can empower higher level developers to grow more in their own careers.&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&lt;font color="#222222"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;&lt;span data-contrast="none"&gt;&lt;strong&gt;&lt;font color="#222222"&gt;Have fun!&lt;/font&gt;&lt;/strong&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&lt;font color="#222222"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;&lt;span data-contrast="none"&gt;&lt;font color="#222222"&gt;Day jobs can be a slog from time to time, even for those who genuinely enjoy what they’re doing. Mentoring adds back in some of the fun of what you do day to day. Helping students work through problems and create exciting new project ideas can help remind you why you got into the field in the first place. Getting more involved in the tech scene is sure to benefit you professionally.It will also surely provide personal benefits as well.&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&lt;font color="#222222"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;&lt;span data-contrast="none"&gt;&lt;font color="#222222"&gt;Creating a strong community of mentorship is not something that happens overnight, but the benefits are worth the hard work. According to a&lt;/font&gt;&lt;/span&gt; &lt;a href="https://www.shrm.org/topics-tools/news/talent-acquisition/real-costs-recruitment"&gt;&lt;span data-contrast="none"&gt;&lt;font color="#1155CC"&gt;2022 article&lt;/font&gt;&lt;/span&gt;&lt;/a&gt; &lt;span data-contrast="none"&gt;&lt;font color="#222222"&gt;from the Society for Human Resource Management (SHRM), employers estimate the total cost to hire a new employee can be three to four times the position’s salary. By cultivating a community of mentorship, your company can lessen those costs by finding talent that is not only a skills match, but a culture match, and set to succeed.&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&lt;font color="#222222"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;&lt;em&gt;&lt;font color="#222222"&gt;Bio: Shannon Sheehy is the Manager of Strategic Partnerships for&lt;/font&gt; &lt;font color="#222222"&gt;Code:You&lt;/font&gt;&lt;font color="#222222"&gt;, a non-profit program that has helped over 1,000 adults launch exciting new careers in technology since 2015. Through her role, she manages the careers team that&lt;/font&gt; &lt;font color="#222222"&gt;assists&lt;/font&gt; &lt;font color="#222222"&gt;program participants in finding jobs after completion of their training program. A Dayton native and graduate of Miamisburg High School, Shannon now&lt;/font&gt; &lt;font color="#222222"&gt;resides&lt;/font&gt; &lt;font color="#222222"&gt;in Louisville, KY.&lt;/font&gt;&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13377363</link>
      <guid>https://www.technologyfirst.org/Tech-News/13377363</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Mon, 01 Jul 2024 13:00:00 GMT</pubDate>
      <title>Budgeting for the Cloud in 2025</title>
      <description>&lt;p&gt;&lt;em&gt;&lt;font face="Verdana, sans-serif"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/Melissa%20July%20LI%20post.png" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/font&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;font face="Verdana, sans-serif"&gt;Hello Tech Community!&lt;/font&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif"&gt;As we gear up for another exciting year in the world of technology, it's time to talk shop about one of the hottest topics on every IT leader's mind: budgeting for the cloud in 2025. I'm thrilled to dive into this with you because, let's face it, the cloud isn't just a buzzword anymore – it's the backbone of modern IT infrastructure.&lt;span data-ccp-props="{"&gt;&amp;nbsp;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;span data-ccp-props="{"&gt;&lt;span data-contrast="auto"&gt;&lt;font face="Verdana, sans-serif"&gt;So, let's start with the headline news: Gartner's latest report predicts that by 2025, a whopping half of enterprise IT spending will be allocated to cloud technologies. Wrap your head around this figure: nearly $1.8 trillion – that's trillion with a 'T' – is expected to be spent on cloud services alone.&lt;/font&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif"&gt;&lt;span data-contrast="auto"&gt;But before you break into a cold sweat thinking about budget overhauls and endless spreadsheets, fear not! I've got your back with a savvy roadmap to help you prepare for this cloud-centric future while keeping your budget in check.&lt;/span&gt;&lt;span data-ccp-props="{"&gt;&amp;nbsp;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif"&gt;Here's the lowdown on how to navigate the cloud migration and budgeting waters in 2025:&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#099AC6" face="Verdana, sans-serif"&gt;1. Know Thy Infrastructure:&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif"&gt;&lt;span data-contrast="auto"&gt;Take stock of your current IT setup like a seasoned detective. What apps are you running? Where are your workloads chilling? Understanding your infrastructure inside-out is key to figuring out what's ready to make the leap to the cloud.&lt;/span&gt;&lt;span data-ccp-props="{"&gt;&amp;nbsp;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#099AC6" face="Verdana, sans-serif"&gt;2. Show Me the Money:&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif"&gt;&lt;span data-contrast="auto"&gt;Budgeting for the cloud isn't just about crunching numbers; it's about predicting the future (cue the crystal ball). Work closely with your finance team to map out the short-term migration costs and the long-term operational expenses. Remember, a little foresight goes a long way!&lt;/span&gt;&lt;span data-ccp-props="{"&gt;&amp;nbsp;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#099AC6" face="Verdana, sans-serif"&gt;3. Craft Your Migration Strategy:&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif"&gt;&lt;span data-contrast="auto"&gt;Rome wasn't built in a day, and neither is your cloud migration plan. Take it step by step. Decide which workloads get first-class tickets to the cloud and which ones can chill in the on-premises lounge a little longer. Oh, and don't forget to factor in downtime – nobody likes surprises!&lt;/span&gt;&lt;span data-ccp-props="{"&gt;&amp;nbsp;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#099AC6" face="Verdana, sans-serif"&gt;4. Lockdown Security &amp;amp; Compliance:&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif"&gt;&lt;span data-contrast="auto"&gt;Security isn't just a buzzword – it's your shield against cyber nasties. Beef up your security measures and ensure you're compliant with all the regulations lurking in the shadows. Trust me; it's worth the peace of mind.&lt;/span&gt;&lt;span data-ccp-props="{"&gt;&amp;nbsp;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#099AC6" face="Verdana, sans-serif"&gt;5. Skill Up, Buttercup:&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif"&gt;&lt;span data-contrast="auto"&gt;The cloud isn't just about fluffy white things in the sky; it's about empowering your team with the skills they need to navigate this brave new world. Invest in training and upskilling initiatives to ensure your squad is ready to rock the cloud like pros.&lt;/span&gt;&lt;span data-ccp-props="{"&gt;&amp;nbsp;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif"&gt;&lt;span data-contrast="auto"&gt;So, there you have it, folks – your roadmap to cloud success in 2025! Buckle up, because the journey ahead is going to be one heck of a ride. And remember, the tech community is here for you.&amp;nbsp;&lt;/span&gt;&lt;span data-ccp-props="{"&gt;&amp;nbsp;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif"&gt;&lt;span data-contrast="auto"&gt;Until next time, stay curious, stay savvy, and keep pushing the boundaries of what's possible in tech!&lt;/span&gt;&lt;span data-ccp-props="{"&gt;&amp;nbsp;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Melissa&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Melissa Cutcher&lt;/strong&gt;&lt;br&gt;
Executive Director&lt;br&gt;
Technology First&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13377839</link>
      <guid>https://www.technologyfirst.org/Tech-News/13377839</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Sat, 01 Jun 2024 13:04:00 GMT</pubDate>
      <title>Protecting Your Capital Investment</title>
      <description>&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;" face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;font&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/Bill%20Edwards%20Blog.jpg" alt="" title="" border="0"&gt;The Industrial Internet of Things (IIoT) and adjacent technology continues to have a profound impact on industrial processes, creating opportunities for product and service transformation. From intuitive graphic interfaces and intelligent device sensors to full-scale industrial workcells and more, successful technology integration is proven to optimize operations. That said, here are several concepts for companies to consider:&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#099AC6" style="font-size: 14px;" face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;strong&gt;&lt;font&gt;Install a Robot&lt;/font&gt;&lt;/strong&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;" face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;font&gt;An outside-of-the-box concept for many to consider, the adoption of robotic technology further enhances the IIoT ecosystem, driving further growth toward operational excellence. Where applicable, companies that successfully integrate and synchronize highly efficient robots with their current network of devices, including capital equipment, have discovered benefits such as greater production workflow, part quality, product throughput, operational safety, and return on investment (ROI).&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;" face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;font&gt;A prime example of this is the integration of an industrial or human-collaborative robot to load/unload machined parts. A highly mundane and potentially dangerous task (depending on the part and environment), the combined use of innovative end-of-arm tooling (EOAT), easy-to-use electrical interfaces and flexible-yet-robust robots enables highly consistent part transfer. Not only is this reliable and consistent method of transfer ideal for protecting the integrity of capital equipment such as press brakes, but also, employee health and safety concerns can be substantially minimized. As an added benefit, workers can be redeployed to safer, value-added tasks for increased competitive edge. Applications for palletizing, pick and place, and welding are other labor intensive tasks that are frequently automated.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#099AC6" style="font-size: 14px;" face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;strong&gt;&lt;font&gt;Execute Security Standards&lt;/font&gt;&lt;/strong&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;" face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;font&gt;Whether an industrial robot or another piece of machinery has been deployed, companies that integrate and synchronize equipment to an IIoT framework should understand the potential cybersecurity threats and vulnerabilities these machines (and others for that matter) can face. From exploiting weak passwords to ransomware attacks and more, there are a variety of ways “bad actors” try to disrupt operations. For these reasons, it is important for decision makers to take all necessary steps to ensure robot and enterprise safety.&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;" face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;font&gt;Adhering to robot safety standards and industry best practices such as the Robot Security Framework (RSF) is suggested. Additionally, replacing default passwords with strong passwords, along with backing up robot and peripheral data at regular intervals is helpful.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;" face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;font&gt;Encryption and authentication techniques to protect data and communication may also be helpful to securely connect robots to necessary systems or networks. Protocols like Secure Sockets Layer (SSL) and Transport Layer Security (TLS) can aid in encrypting and authenticating data transmitted over the internet or other networks, while Virtual Private Network (VPN) technology can create a secure and encrypted tunnel between devices and a remote server. Public Key Infrastructure (PKI) may also be used to employ digital certificates and keys to encrypt and authenticate data.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;" face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;font&gt;“Hardening” devices and existing networks to withstand physical and logical attacks is also important. This process is done by applying security measures and configurations that disable and/or remove any service and feature that is not required for robot or device operation. This includes apps, interfaces, ports, protocols, etc.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;" face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;font&gt;Clearly defining internal roles and responsibilities for managing the robotic system (and inter-connected devices), when needed, is also ideal. While this is not a complete list of protocols and methods that may be used, it indicates that cybersecurity is a real threat that should be taken seriously, and proper precautions should be implemented to protect operational integrity.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#099AC6" style="font-size: 14px;" face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;strong&gt;&lt;font&gt;Use Machine Monitoring&lt;/font&gt;&lt;/strong&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;" face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;font&gt;Many devices (CNC machines, robots, grippers, scanners, torches, etc.) can provide a wealth of information pertaining to equipment performance and operational trends. The ability to check, harness, and transform this data into actionable insights is extremely valuable for achieving the highest level of operational efficiency – as it enables data-driven optimized planning for key decision making.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;" face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;font&gt;That said, the implementation of a factory automation monitoring system that supports multiple brand devices and collects data in real time is suggested. From a manufacturing perspective, IIoT monitoring tools (along with product/part tracking) are helpful for detecting system errors, part defects and production bottlenecks.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;" face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;font&gt;Proven edge server solutions that use a leading OPC-UA interface to enable an integrated, intelligent, and innovative approach to data analytics are ideal. This allows decision makers to see what is happening at any point on the value creation chain. In turn, this helps to make informed choices that provide the ability to better manage supply chain complexity, maintain high-throughput production and execute strategic company goals.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#099AC6" style="font-size: 14px;" face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;strong&gt;&lt;font&gt;Practice Preventative Maintenance&lt;/font&gt;&lt;/strong&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;" face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;font&gt;The key to peak performance operations is maintaining the health of a robot and other capital equipment. While the use of machine monitoring for predictive and preventative maintenance can play a large part in the life cycle management of automated tools, visual checks of a robot system should not be overlooked. From performing a grease analysis to monitor iron levels to doing a manual test to check for worrisome vibrations and gear noise, there are common assessments end users should perform to protect their robotic investment.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;" face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;font&gt;With any high-end purchase, it is always smart to invest in the value-added support programs available through the equipment supplier. Not only does this help ensure maximum asset performance, but also it provides prime ROI. Locking into an annual or extended service plan can augment a company’s preventative maintenance strategy, while ensuring issues are addressed in a timely manner to optimize uptime.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;" face="Rubik"&gt;&lt;span data-contrast="auto"&gt;&lt;font&gt;Whether protecting a robot or robot system purchase, maintaining the life cycle of another piece of capital equipment, these concepts should help build a solid foundation. As always, any questions should be directed to your robot supplier or equipment manufacturer – as this will provide the best source of information for moving forward.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;font style="font-size: 14px;" face="Rubik"&gt;&lt;span data-contrast="auto" style=""&gt;&lt;span style=""&gt;&lt;font&gt;Bio:&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/span&gt;&lt;span data-contrast="auto" style=""&gt;&lt;font&gt;Bill Edwards is Sr. Manager of Collaborative Robotics at Yaskawa Motoman, where he strategically oversees all aspects of collaborative robot planning, design, specification and approval. With over three decades of experience in engineering and project management, as well as control systems application and design, Bill is dedicated to developing safe, high-quality robots that foster greater production efficiency. He is a voting member for both the International Organization for Standardization (ISO) and the American National Standards Institute (ANSI), where he serves on various industrial robot safety committees.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}" style=""&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/em&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13365065</link>
      <guid>https://www.technologyfirst.org/Tech-News/13365065</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Sat, 01 Jun 2024 13:02:00 GMT</pubDate>
      <title>Protecting Your Technology Investment in the Face of Fast-Paced Changes and Security Threats</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/Barry%20Hassler%20blog%20(1).png" alt="" title="" border="0"&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;In today's rapidly evolving technology landscape, safeguarding your investment in technology is good business sense. With the ever-present threat of cyber-attacks to companies of all sizes and the need for scalability, businesses must adopt proactive measures to protect their assets while maintaining flexibility for growth. This article explores a concept called “continuous threat exposure management” and strategies to ensure scalability in the face of these evolving challenges.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;&lt;strong&gt;&lt;font color="#099AC6"&gt;Continuous Threat Exposure Management&lt;br&gt;&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;ol&gt;
  &lt;li&gt;&lt;font style="font-size: 14px;"&gt;Vulnerability Assessment: Scope for cybersecurity exposure&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font style="font-size: 14px;"&gt;Develop a discovery process for assets and their risk profiles&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font style="font-size: 14px;"&gt;Prioritize the threats most likely to be exploited&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font style="font-size: 14px;"&gt;Validate how attacks might work and how systems might react&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font style="font-size: 14px;"&gt;Mobilize people and processes&lt;/font&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;font style="font-size: 14px;" color="#099AC6"&gt;&lt;strong&gt;SUMMARY&lt;/strong&gt;&lt;/font&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;Continuous Threat Exposure Management (CTEM) is a formal, proactive approach to identifying, assessing, and mitigating risks to an organization's digital assets. It involves continuously monitoring the organization's technology infrastructure, applications, networks, and data for vulnerabilities and potential threats. The goal of CTEM is to minimize the organization's exposure to cyber threats by identifying and addressing weaknesses before they can be exploited by attackers. The need for processes like CTEM in organizations of all sizes is an unfortunate reality of today’s world.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;According to Gartner, the 5 major steps in CTEM are:&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;&lt;font color="#099AC6"&gt;&lt;strong&gt;Vulnerability Assessment&lt;/strong&gt;:&lt;/font&gt; Regularly scanning and assessing the organization's systems and networks to identify vulnerabilities, misconfigurations, and weaknesses that could be exploited by cyber threats. &amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;The full vulnerability assessment process is an ongoing investigation of not only what ports might be accessible from the Internet, but also a complete scan of internal resources and what might be accessible to a “bad guy” if they do get inside the network.&amp;nbsp; In years past, it was often deemed sufficient to do a scan of your company’s “public” footprint to see what ports might be open to internal resources and identify any misconfigurations or flawed security from that perspective. More recently however, since over 90% of cyberattacks begin with a phishing email, which ends up either compromising a local system, or a cloud email platform, looking at the technology from the perspective of the bad guy is the better approach.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;Most organizations, especially smaller companies, may not have the internal resources or tools to conduct these types of scans internally. The use of an external 3&lt;sup&gt;rd&lt;/sup&gt; party resource which specializes in Cyber Security Penetration Testing is advised. Even MSPs (Managed Service Providers) find it wise to outsource this specialized service to 3&lt;sup&gt;rd&lt;/sup&gt; parties on behalf of their clients.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;&lt;strong&gt;&lt;font color="#099AC6"&gt;Threat Intelligence Integration&lt;/font&gt;&lt;/strong&gt;: Incorporating threat intelligence feeds from various sources to stay informed about emerging threats, attack techniques, and indicators of compromise relevant to the organization's industry and technology environment.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;Keeping up to date on everything technology related is a daunting process, and now we need to keep a close eye on Threat Intelligence as well. While there are many open-source, online resources that provide lots of up-to-date information on threats, keeping up to date on them is difficult, especially for small businesses.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;The FBI’s InfraGard program is a collaborative product between the FBI (Federal Bureau of Investigation) and members of the private sector. Authorized users of the InfraGard program can share information, networks and educational workshops to keep up on threats relevant to 16 specific infrastructure categories.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;There are also 3&lt;sup&gt;rd&lt;/sup&gt; party resources providing consolidated resources for vulnerability and intelligence.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;&lt;font color="#099AC6"&gt;&lt;strong&gt;Patch Management&lt;/strong&gt;:&lt;/font&gt; Implementing a structured process for installing security patches and updates promptly to address known vulnerabilities in software, operating systems, and applications.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;It is common knowledge that Microsoft, as one of the predominant software providers, releases their standard patches on “Patch Tuesday” -- the second Tuesday of each month. Patch Tuesday is the unofficial term for the day when Microsoft releases update packages for the Windows operating system and other Microsoft software applications, including Microsoft Office. In some cases, Microsoft will issue "out-of-band" updates for particularly critical security flaws, especially ones that are being exploited in the wild.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;As Microsoft patches security vulnerabilities, it doesn't release those patches immediately. Instead, the company gathers those fixes into a larger update, which is released on Patch Tuesday.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;Windows workstations and servers automatically (by default) check for updates about once per day. The average system should automatically download these updates quickly but may delay installation.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;With the number of issues with Microsoft updates over the past several years, many organizations hold off on applying updates for a week or two, to make sure there are no issues noticed.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;&lt;strong&gt;&lt;font color="#099AC6"&gt;Security Monitoring&lt;/font&gt;&lt;/strong&gt;: Using monitoring tools and technologies to continuously monitor network traffic, system logs, and user activities for signs of suspicious or malicious behavior that could indicate a security threat.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;Network monitoring is crucial for small businesses to ensure the health and functionality of their computer networks. In today’s digital landscape, where businesses heavily rely on technology, having a robust network monitoring system is essential to find issues and potential threats. As small businesses often have limited IT (Information Technology) resources, it becomes even more vital to have efficient network monitoring in place.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;&lt;strong&gt;&lt;font color="#099AC6"&gt;Incident Response Planning&lt;/font&gt;&lt;/strong&gt;: Developing and regularly testing incident response plans to ensure the organization is prepared to detect, contain, and respond effectively to security incidents when they occur.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;Businesses should have a written plan that identifies those steps to take in an incident, including notifications to Cyber Insurance carriers, customers, and law enforcement. Preventive steps to keep business functionality include backup and recovery procedures to help a business recover and get back to normal operation as quickly as possible.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;&lt;strong&gt;&lt;font color="#099AC6"&gt;Risk Prioritization and Remediation&lt;/font&gt;&lt;/strong&gt;: Prioritizing vulnerabilities and security risks based on their severity, likelihood of exploitation, and potential impact on the organization's operations, and implementing proper remediation measures to mitigate these risks.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;The formal Continuous Threat Exposure Management (CTEM) process is an approach to identify, assess and mitigate risks to an organization's technology assets. While this approach is ideal in a perfect world, it does entail significant investments in processes and resources.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;For smaller business without the internal resources for this process, a Managed Service Provider may be able to provide these services or coordinate with 3&lt;sup&gt;rd&lt;/sup&gt; parties for some of these steps such as Vulnerability Assessments, understanding threats, implementing Patch Management controls and Security Monitoring.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;&lt;font style="font-size: 14px;"&gt;&lt;em&gt;Bio: Barry Hassler is the founder and President of Hassler Communication Systems Technology, Inc (HCST), a business IT Managed Services Provider based in Beavercreek OH. HCST has been in business since 1991 and serves a variety of small businesses primarily in the Dayton and Springfield Ohio&lt;/em&gt;&lt;/font&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;Panetta, Kasey, “How to Manage Cybersecurity Threats, Not Episodes”, Gartner, 3 May 2024, &lt;a href="https://www.gartner.com/en/articles/how-to-manage-cybersecurity-threats-not-episodes"&gt;https://www.gartner.com/en/articles/how-to-manage-cybersecurity-threats-not-episodes&lt;/a&gt;&lt;/font&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13365063</link>
      <guid>https://www.technologyfirst.org/Tech-News/13365063</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Sat, 01 Jun 2024 13:00:00 GMT</pubDate>
      <title>The Overlooked Security Risk</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/Leah%20Seymour%20Blog%202.png" alt="" title="" border="0"&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;Copiers (MFPs) and Printers are often forgotten when it comes to a company’s security policy.&amp;nbsp; As IT professionals continue to invest time and money into tightening their cybersecurity, it is vital to include MFPs and Printers in their policy.&amp;nbsp;&amp;nbsp; Copiers of years ago were simple devices, not connected to a network and they only made copies.&amp;nbsp;&amp;nbsp; As technology has advanced, so have MFPs.&amp;nbsp; These devices are just like any other device on your network and are a gateway to an enterprise’s most sensitive data.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;According to a 2023 Print Security Landscape Survey by Quocirca, 61% of organizations have experienced a print-related data loss over the past year and 39% struggle to keep up with printer security.&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;Below are the top MFP and Printer security risks and how to mitigate them:&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;1. &lt;strong&gt;&lt;font color="#099AC6"&gt;Physical Access:&amp;nbsp;&lt;/font&gt;&lt;/strong&gt;Documents left on the output tray pose a significant security risk.&amp;nbsp; We recommend a “follow you” print strategy to enable the device to “hold” the job until an end user authenticates and releases at the device.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;2. &lt;strong&gt;&lt;font color="#099AC6"&gt;Default passwords:&lt;/font&gt;&lt;/strong&gt; &lt;span&gt;F&lt;/span&gt;actory preset credentials need to be changed by administrators.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;3. &lt;strong&gt;&lt;font color="#099AC6"&gt;Lock Down Scanning Access:&lt;/font&gt;&amp;nbsp;&lt;/strong&gt;MFPs are often used more for scanning than copying.&amp;nbsp;&amp;nbsp; Scanning should be locked down at the minimum to scan only to your company’s domain.&amp;nbsp; To take it a step further, having users authenticate with their user credentials and enabling “scan to myself” is a best practice. If scanning isn’t locked down, confidential documents can be sent to “Gmail or Yahoo” addresses and your company wouldn’t even know it was sent.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;4. &lt;strong&gt;&lt;font color="#099AC6"&gt;Lack of Security updates:&lt;/font&gt;&lt;/strong&gt; &lt;span&gt;Y&lt;/span&gt;our Vendor should work with you to ensure these devices have updated firmware and software patches.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;5. &lt;strong&gt;&lt;font color="#099AC6"&gt;Hard drive wipes:&lt;/font&gt;&lt;/strong&gt; &lt;span&gt;B&lt;/span&gt;efore these devices leave your environment to either be shipped back to a leasing company or decommissioned, it is vital to wipe or destroy the hard drive.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;6. &lt;strong&gt;&lt;font color="#099AC6"&gt;Track and audit device usage:&lt;/font&gt;&lt;/strong&gt; &lt;span&gt;M&lt;/span&gt;any companies are investing in print management software to track who is using these devices and how they are using them.&amp;nbsp; You can limit what a user has access to and have audit trails of how each employee is using the device.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;7.&amp;nbsp;&lt;strong&gt;&lt;font color="#099AC6"&gt;Home office printing:&lt;/font&gt;&lt;/strong&gt; &lt;span&gt;W&lt;/span&gt;ith the trend of a hybrid workplace continuing to grow, it is vital to make sure that home office printers are configured and set up with the same security settings as your in-office devices are.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;8. &lt;strong&gt;&lt;font color="#099AC6"&gt;Standard security features on devices:&amp;nbsp;&lt;/font&gt;&lt;/strong&gt;Many devices now come with SIEM integration, Verify System at Startup, SSD Data Encryption, and Encrypted Secure Print.&amp;nbsp; It is important to ensure that these security features are enabled and set up properly.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;9. &lt;strong&gt;&lt;font color="#099AC6"&gt;Cloud printing risks:&lt;/font&gt;&lt;/strong&gt; &lt;span&gt;C&lt;/span&gt;loud printing services are on the rise, but it is important that your provider has robust security measures in place.&amp;nbsp; End-to-end encryption of print jobs, reviewing activity logs and reviewing access control all need to be in place.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;MFPs and Printers are an integral piece of technology in organizations, but if left unmanaged can pose a high security risk.&amp;nbsp;&amp;nbsp; Confidential data regularly moves between user’s PCs, Servers and MFPs/Printers, so it’s important to have a security plan in place to protect your print environment.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;&lt;em&gt;Bio: Leah Seymour is the Senior Sales Director for Modern Office Methods (MOM) and has 26 years of experience in the Office Equipment Industry.&amp;nbsp; She specializes in working with IT Leaders in Healthcare, Manufacturing, Logistics and Higher Education to help them improve productivity, control costs and secure their devices.&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13365037</link>
      <guid>https://www.technologyfirst.org/Tech-News/13365037</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Sat, 01 Jun 2024 12:00:00 GMT</pubDate>
      <title>Protecting Your Investments: It Begins &amp; Ends With Your People</title>
      <description>&lt;p&gt;&lt;font style="font-size: 16px;"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/Melissa%20June%20Newsletter.png" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;&lt;font&gt;Building a technology organization involves substantial investments – from hardware, software, and cloud solutions to the critical processes governing, modernizing, and maintaining operations, not to mention the invaluable talent driving these initiatives.&lt;/font&gt;&lt;span data-ccp-props="{}"&gt;&amp;nbsp;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;&lt;span data-contrast="none"&gt;Your investment in people is particularly crucial, as skilled personnel play a pivotal role in developing, managing, and effectively utilizing technology. Identifying, recruiting, and onboarding the right talent requires significant time and resources. However, the journey doesn't end there. Retaining these team members necessitates a strategic plan and continued commitment of time and resources.&lt;/span&gt;&lt;span data-ccp-props="{}"&gt;&amp;nbsp;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;&lt;span data-contrast="none"&gt;Here's how your business can safeguard its investment in people:&lt;/span&gt;&lt;span data-ccp-props="{}"&gt;&amp;nbsp;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#099AC6" face="Verdana, sans-serif" style="font-size: 16px;"&gt;Leverage Technology First:&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;font color="#000000"&gt;&lt;font color="#4D5758" face="Verdana, sans-serif" style="font-size: 16px;"&gt;&lt;span data-contrast="none"&gt;Attend peer group meetings for insightful peer-to-peer sharing and learning.&lt;/span&gt;&lt;span data-ccp-props="{"&gt;&amp;nbsp;&lt;/span&gt;&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;

  &lt;li data-leveltext="o" data-font="Courier New" data-listid="1" data-list-defn-props="{" data-aria-posinset="2" data-aria-level="3"&gt;&lt;font color="#000000"&gt;&lt;font color="#4D5758" face="Verdana, sans-serif" style="font-size: 16px;"&gt;&lt;span data-contrast="none"&gt;Transform a peer group meeting into a one-on-one development opportunity by bringing a team member along.&lt;/span&gt;&lt;span data-ccp-props="{"&gt;&amp;nbsp;&lt;/span&gt;&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;

  &lt;li data-leveltext="o" data-font="Courier New" data-listid="1" data-list-defn-props="{" data-aria-posinset="3" data-aria-level="3"&gt;&lt;font color="#000000"&gt;&lt;font color="#4D5758" face="Verdana, sans-serif" style="font-size: 16px;"&gt;&lt;span data-contrast="none"&gt;Expand knowledge and strengthen networks by attending conferences.&lt;/span&gt;&lt;span data-ccp-props="{"&gt;&amp;nbsp;&lt;/span&gt;&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;

  &lt;li data-leveltext="o" data-font="Courier New" data-listid="1" data-list-defn-props="{" data-aria-posinset="4" data-aria-level="3"&gt;&lt;font color="#000000"&gt;&lt;font color="#4D5758" face="Verdana, sans-serif" style="font-size: 16px;"&gt;&lt;span data-contrast="none"&gt;Encourage subject matter experts (SMEs) to submit presentations at conferences, enhancing their speaking skills.&lt;/span&gt;&lt;span data-ccp-props="{"&gt;&amp;nbsp;&lt;/span&gt;&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;

  &lt;li data-leveltext="o" data-font="Courier New" data-listid="1" data-list-defn-props="{" data-aria-posinset="5" data-aria-level="3"&gt;&lt;font color="#000000"&gt;&lt;font color="#4D5758" face="Verdana, sans-serif" style="font-size: 16px;"&gt;&lt;span data-contrast="none"&gt;Foster collaboration by actively participating in our peer resource group forums.&lt;/span&gt;&lt;span data-ccp-props="{"&gt;&amp;nbsp;&lt;/span&gt;&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;

  &lt;li data-leveltext="o" data-font="Courier New" data-listid="1" data-list-defn-props="{" data-aria-posinset="6" data-aria-level="3"&gt;&lt;font color="#000000"&gt;&lt;font color="#4D5758" face="Verdana, sans-serif" style="font-size: 16px;"&gt;&lt;span data-contrast="none"&gt;Join a committee and contribute resources to give back to the community.&lt;/span&gt;&lt;span data-ccp-props="{"&gt;&amp;nbsp;&lt;/span&gt;&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;

  &lt;li data-leveltext="o" data-font="Courier New" data-listid="1" data-list-defn-props="{" data-aria-posinset="7" data-aria-level="3"&gt;&lt;font color="#000000"&gt;&lt;font color="#4D5758" face="Verdana, sans-serif" style="font-size: 16px;"&gt;&lt;span data-contrast="none"&gt;Share volunteer opportunities with your team to promote team building.&lt;/span&gt;&lt;span data-ccp-props="{"&gt;&amp;nbsp;&lt;/span&gt;&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;

  &lt;li data-leveltext="o" data-font="Courier New" data-listid="1" data-list-defn-props="{" data-aria-posinset="8" data-aria-level="3"&gt;&lt;font color="#000000"&gt;&lt;font color="#4D5758" face="Verdana, sans-serif" style="font-size: 16px;"&gt;Nominate a team member for a Technology First Leadership Award and attend the event to support all finalists.&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;&lt;strong&gt;&lt;font color="#099AC6" face="Verdana, sans-serif"&gt;Prioritize Well-being and Development:&lt;/font&gt;&lt;/strong&gt;&lt;font color="#099AC6" face="Verdana, sans-serif"&gt;&amp;nbsp;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li data-leveltext="o" data-font="Courier New" data-listid="6" data-list-defn-props="{" data-aria-posinset="9" data-aria-level="2"&gt;&lt;font color="#000000"&gt;&lt;font color="#4D5758" face="Verdana, sans-serif" style="font-size: 16px;"&gt;&lt;span data-contrast="none"&gt;By prioritizing the well-being, growth, and development of your technology workforce, your business can ensure a resilient and motivated team that drives innovation in the dynamic technology landscape.&lt;/span&gt;&lt;span data-ccp-props="{"&gt;&amp;nbsp;&lt;/span&gt;&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;&lt;strong&gt;&lt;font color="#099AC6" face="Verdana, sans-serif"&gt;Connect, Strengthen, and Champion Your People:&lt;/font&gt;&lt;/strong&gt;&lt;font color="#099AC6" face="Verdana, sans-serif"&gt;&amp;nbsp;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li data-leveltext="o" data-font="Courier New" data-listid="6" data-list-defn-props="{" data-aria-posinset="10" data-aria-level="2"&gt;&lt;font color="#000000"&gt;&lt;font color="#4D5758" face="Verdana, sans-serif" style="font-size: 16px;"&gt;&lt;span data-contrast="none"&gt;The more you invest in connecting, strengthening, and championing your people, the more invested they will be in the career you're developing together.&lt;/span&gt;&lt;span data-ccp-props="{"&gt;&amp;nbsp;&lt;/span&gt;&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;&lt;span data-contrast="none"&gt;As you focus on protecting your technology investment, take a moment to enjoy summer activities that energize you. We hope to see you at one of our upcoming Tech First events!&lt;/span&gt;&lt;span data-ccp-props="{"&gt;&amp;nbsp;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;&lt;font style="font-size: 16px;"&gt;&lt;em&gt;&lt;font face="Verdana, sans-serif"&gt;Melissa&lt;/font&gt;&lt;/em&gt;&lt;/font&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13366154</link>
      <guid>https://www.technologyfirst.org/Tech-News/13366154</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Thu, 25 Apr 2024 16:32:04 GMT</pubDate>
      <title>What Every Tech Leader Should Stop Doing Right Now</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/Jeremy%20Boerger%20Blog%202.svg" alt="" title="" border="0"&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 15px;"&gt;&lt;em&gt;*SMACK!*&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 15px;"&gt;Stop it!&amp;nbsp; Stop it right now!&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 15px;"&gt;&lt;em&gt;*SMACK!*&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 15px;"&gt;We all know the classic Hollywood trope: the heroine stands her ground in front of the &lt;font&gt;“&lt;/font&gt;false threat”. In the face of her unexpected authority and steadfast agency, that threat suddenly comes up short (and to great comic effect!).&amp;nbsp; From there, what initially presents itself as an insurmountable obstacle to the heroine &lt;font&gt;’&lt;/font&gt;s journey transforms into a loyal and steadfast ally for the rest of the plot.&amp;nbsp; Think: Dorothy and the Cowardly Lion, or Cher and Nicolas Cage, or Kagome and Inuyasha.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 15px;"&gt;If only life would work like that.&amp;nbsp; If only our work would work like that.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 15px;"&gt;There are a lot of lessons to be pulled out of these stories: team building, change management, system transformation, etc.&amp;nbsp; But there &lt;font&gt;’&lt;/font&gt;s a warning here, too.&amp;nbsp; A warning that gets glossed over too often and leads to a lot of failed team building, change initiatives, and system transformations.&amp;nbsp; The warning of the Magic Bullet Mentality - mistaking the resolution of the &lt;font&gt;“&lt;/font&gt;false threat” for the solution of the real problem.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 15px;"&gt;Everyone falls for the Magic Bullet at some time; most times, multiple times.&amp;nbsp; &lt;font&gt;“&lt;/font&gt;Do this one thing!” “Make this one change!” “Install this one tool!” Too often, especially in Information Technology, the Magic Bullet Mentality leads to buying and installing some very high-priced (and, therefore, high-visibility) tools that fail to live up to their promises.&amp;nbsp; And what do you have to show for it all?&amp;nbsp; A big hole in your budget, a burned out support team, and a lot of angry questions from your business leadership.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 15px;"&gt;So, if we are all susceptible to the trap, how can we avoid this ‘magic bullet’ thinking?&amp;nbsp; Even better, is there a way to rescue a deployment that obviously started with a ‘magic bullet’ in mind?&amp;nbsp; There are three questions to ask, right now, to help:&lt;/font&gt;&lt;/p&gt;

&lt;h2&gt;&lt;font face="Rubik" color="#01507A" style="font-size: 16px;"&gt;&lt;strong&gt;1. Do you have a “Process Map”?&lt;/strong&gt;&lt;/font&gt;&lt;/h2&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 15px;"&gt;Process mapping might not be the latest buzzword, but it’s darned important nonetheless.&amp;nbsp; And the sooner the process mapping is done around the existing tool, the better.&amp;nbsp; That’s right; the existing tool.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 15px;"&gt;Too often we’re so enamored with the promised benefits of the &lt;em&gt;new tool&lt;/em&gt;, we want to skip to the end and not do the due diligence necessary to map out the work ahead.&amp;nbsp; But how else can one ensure new tooling will successfully take over the job of the old one, if you can’t describe the work the old one was doing?&amp;nbsp; You can’t.&amp;nbsp; You need a baseline to measure against.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 15px;"&gt;The Process Map as a baseline has another benefit.&amp;nbsp; Once completed, a savvy project manager can take it, break it down into the individual components and efforts, and build a much more effective project plan.&amp;nbsp; And a project manager with a proper project plan will be much more likely to succeed.&amp;nbsp; Already started the project and don’t have the Process Map completed?&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 15px;"&gt;&lt;em&gt;*SMACK*&lt;/em&gt; “Shame on you!” - Dorothy Gale, &lt;em&gt;Wizard of Oz (1939)&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;

&lt;h2&gt;&lt;font face="Rubik" color="#01507A" style="font-size: 16px;"&gt;&lt;strong&gt;2. Do you have a “Data Map”?&lt;/strong&gt;&lt;/font&gt;&lt;/h2&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 15px;"&gt;Data mapping is a newer buzzword, but it is not the same as a Process Map.&amp;nbsp; A Process Map charts the relationships between business functions and processes.&amp;nbsp; It provides insight on: which departments are responsible and accountable for what activity, who gets informed or consulted about those results, and what needs to happen before and after.&amp;nbsp; A Data Map describes the flow of information between the various systems and technologies described in the Process Map, down to the individual data attributes.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 15px;"&gt;Consider an example.&amp;nbsp; Three teams work together to procure hardware and software assets: Vendor Management, Purchasing, and IT Service Management.&amp;nbsp; Each uses different tools to do their jobs and coordinate using email, chat, and excel charts.&amp;nbsp; The Process Map will show how these teams work together, and how a new ERP system could provide response and operational efficiencies.&amp;nbsp; The Data Map would show that the Service Management team needs cost center codes and project number data in order to keep break/fix inventory separate from capital expensed equipment.&amp;nbsp; And, come to find out, that new ERP system requires a whole separate financial module to be able to handle that demand.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 15px;"&gt;Let me guess.&amp;nbsp; You already started the project without a data map?&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 15px;"&gt;&lt;em&gt;*SMACK*&lt;/em&gt; Snap out of it! - Loretta Castorini, &lt;em&gt;Moonstruck (1987)&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;

&lt;h2&gt;&lt;font face="Rubik" color="#01507A" style="font-size: 16px;"&gt;&lt;strong&gt;3. Have you done a “Feature Analysis”?&lt;/strong&gt;&lt;/font&gt;&lt;/h2&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 15px;"&gt;To be fair, the issue exemplified above could also have been noticed with a proper Feature Analysis.&amp;nbsp; Nobody likes doing them, but the money and heartache that can be avoided by making sure the right tool is chosen cannot be stressed enough!&amp;nbsp; A Feature Analysis goes beyond merely sitting through a boring sales demo, or copy/pasting the feature comparison from &lt;a href="http://gartner.com" target="_blank"&gt;&lt;font&gt;gartner.com&lt;/font&gt;&lt;/a&gt; .&amp;nbsp; The Feature Analysis lays out the manufacturer’s plans and roadmaps for future features, prices out the cost of support services and discounts offered, interviews and investigates other customers’ satisfaction with the tool and implementation.&amp;nbsp; The Feature Analysis will also draw direct connections between issues internal clients are having with their existing tooling and the features offered by all the other tools being considered.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 15px;"&gt;Unfortunately, a Feature Analysis will not be of much good if the tool has already been purchased.&amp;nbsp; But if you are still in the planning stage?&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 15px;"&gt;&lt;em&gt;*SMACK*&lt;/em&gt; “Sit boy!” - Kagome, &lt;em&gt;Inuyasha (2000)&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;

&lt;h2&gt;&lt;font face="Rubik" color="#01507A" style="font-size: 16px;"&gt;&lt;strong&gt;BONUS QUESTION: Consider a third-party consultant?&lt;/strong&gt;&lt;/font&gt;&lt;/h2&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 15px;"&gt;The idea of bringing in a third-party consultant - in addition to the internal technical personnel, the manufacturer’s technical resources, project manager, stakeholders, etc. - gives the feeling of ‘too many cooks in the kitchen.’&amp;nbsp; However, if the installation project is already in flight and there is a high degree of “magic bullet” thinking, a third-party consultant can be just the solution.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 15px;"&gt;The manufacturer’s provided resources are really there for one goal: to complete this installation to the client’s satisfaction (or contractual obligation).&amp;nbsp; Usually, they will be running a script, checking boxes, and only provide specific solutions to specific technical challenges that arise.&amp;nbsp; They will not be able to make suggestions surrounding process changes, data flows, internal responsibilities or external accountabilities.&amp;nbsp; The internal team might know the ins-and-outs of the current platform, policies, and users.&amp;nbsp; But they might not have the experience with large digital transformations and the challenges the new tooling will present.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 15px;"&gt;A third-party, independent consultant can provide the experience and guidance to help both the internal and external teams succeed.&amp;nbsp; An experienced consultant will have actively participated in a number of similar deployments (not just the tool in question, but competitors as well).&amp;nbsp; They will be able to describe the usual mistakes and provide recommendations to the internal team and increase their change of success.&amp;nbsp; At the same time, they can engage the tooling resources to effectively and efficiently ensure the tooling resources can overcome challenges in a way that ensures long-term success for the client (not just the installation).&amp;nbsp; A third-party, independent consultant can also provide benefits in other areas as well: completing documentation, crafting training materials, building internal reporting to ensure the new tool stays useful.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Rubik" style="font-size: 12px;"&gt;&lt;em&gt;Bio: Jeremy Boerger founded Boerger Consulting, to improve and promote the benefits of Information Technology Asset Management (ITAM) programs for medium and large businesses.&amp;nbsp;&amp;nbsp;He is a published author and sought-after speaker at technology expos, conventions, and podcasts around the world.&amp;nbsp;&amp;nbsp;His clients routinely see a one-third reduction in their software operations budget, usually within nine- to twelve-month timeframe.&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13348193</link>
      <guid>https://www.technologyfirst.org/Tech-News/13348193</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Thu, 25 Apr 2024 16:19:36 GMT</pubDate>
      <title>Stop Hiding in Your Office</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/Karen%20Kauffman%20Blog%202.svg" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;In the tech leadership world, there’s this common trap we can fall into—hiding away in our offices. It's easy to do, especially for those of us who lean a bit on the introverted side. But here’s the thing: to really get the pulse of what’s happening in our field, we've got to get out there and engage with the people doing the actual work. Technology’s all about making things easier and more innovative for our teams, but there’s often a gap. Folks not living and breathing tech might not know about all the cool tools they could use, and us tech leaders might not see the creative shortcuts or workarounds they're using to get things done.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;So, how do we bridge this gap? How do we get more in tune with the heartbeat of our companies? Here are a few thoughts:&lt;/font&gt;&lt;/p&gt;

&lt;div style="margin-left: 2em"&gt;
  &lt;ul&gt;
    &lt;li&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;&lt;strong&gt;&lt;font color="#01507A"&gt;Chat it up in the hallways:&lt;/font&gt;&lt;/strong&gt;&lt;font style="color: rgb(36, 36, 36);"&gt;&amp;nbsp;Seriously, just talk to people. Get to know the movers and shakers in your company. You’ve got to build some trust, so they'll open up about their daily grind. When you’re visiting different sites or meeting with customers, leave some room in your schedule for those chance hallway chats that can lead to gold. Find out what big problems they’re trying to crack and maybe, you can throw in your two cents about a project that might help them out.&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;&lt;strong&gt;&lt;font color="#01507A"&gt;Mix your teams:&lt;/font&gt;&lt;/strong&gt;&lt;font&gt;&lt;font color="#01507A"&gt;&amp;nbsp;&lt;/font&gt;&lt;font&gt;Have your tech folks spend some time shadowing the end-users. It’s eye-opening to see if the tools you’ve deployed are actually making life easier for them or if they're just sitting there gathering virtual dust.&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;&lt;strong&gt;&lt;font color="#01507A"&gt;Know your stuff:&lt;/font&gt;&lt;/strong&gt;&lt;font style="color: rgb(36, 36, 36);"&gt;&amp;nbsp;&lt;/font&gt;&lt;font style=""&gt;This one’s a given but keep digging deep into what your business systems can do. The more you know, the better you can jump into conversations with something useful to contribute.&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;&lt;strong&gt;&lt;font color="#01507A"&gt;Circle back on solutions:&lt;/font&gt;&lt;/strong&gt;&lt;font&gt;&lt;font color="#01507A"&gt;&amp;nbsp;&lt;/font&gt;&lt;font&gt;After you roll out a new tool or system, don’t just walk away. Check back in after a month or two to see if it’s really making a difference or if it needs a tweak here and there.&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;Getting out of your office and engaging with your team not only helps your tech team get seen as the go-to problem solvers but also makes your work a lot more enjoyable. It’s about building connections, understanding the real-world application of your work, and continuously improving things.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;In short, stepping away from the comfort zone of your office and diving into the daily lives of those around you is key for any tech leader looking to make a real impact. It’s all about fostering a sense of community, being open to learning from the ground up, and using that insight to drive innovation and efficiency. Plus, it’s just a more fun and fulfilling way to work. Making those connections, understanding challenges first-hand, and seeing the direct impact of your solutions.&lt;/font&gt;&lt;/p&gt;

&lt;p align="center"&gt;&lt;font face="Rubik" style="font-size: 16px;"&gt;*****&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Rubik" style="font-size: 12px;"&gt;&lt;em&gt;&lt;strong style=""&gt;&lt;font style=""&gt;Bio:&lt;/font&gt;&lt;/strong&gt; &lt;font style=""&gt;Karen Kauffman is the Director of Information Technology at Precision Strip Inc.&amp;nbsp; Karen has 35 years of experience in the IT industry, with 20 years of leadership experience.&amp;nbsp; Precision Strip leads the industry in metal processing for the automotive, appliance and beverage can industries.&lt;/font&gt;&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13348188</link>
      <guid>https://www.technologyfirst.org/Tech-News/13348188</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Thu, 25 Apr 2024 15:18:40 GMT</pubDate>
      <title>Unchecked Generative AI: An Amplified Insider Threat Tech Leaders Must Address</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/Ramone%20Kenney%20Blog.svg" alt="" title="" border="0"&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font style="font-size: 15px;" face="Rubik"&gt;If we were to view technological growth through a wide-angled lens, it becomes evident that advancements are significantly outpacing governance. This rapid progress presents tech leaders with a formidable challenge: &lt;strong&gt;&lt;font color="#057091"&gt;&lt;em&gt;How do you safely deploy Generative AI while maintaining data security?&lt;/em&gt;&lt;/font&gt;&lt;/strong&gt; As a transformative force, Generative AI rockets innovation forward. Yet, from a data governance perspective, these AI tools also introduce great risks such as unintentionally birthing an amplified insider threat. This dichotomy makes vigilant oversight crucial. This article highlights the dual nature of Generative AI and proposes essential steps to harness its potential while ensuring a safer deployment.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font style="font-size: 15px;" face="Rubik" color="#057091"&gt;&lt;strong style=""&gt;The Double-Edged Sword of Generative AI: Innovation and Risk&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font style="font-size: 15px;" face="Rubik"&gt;Generative AI significantly bolsters one technological capability, serving as a uniquely clever assistant that streamlines creative processes and enhances data analysis. These advancements don't just open the door to a wide variety of innovative opportunities—they also add a layer of complexity to the management and oversight of these potent productivity enhancers. Without proper checks, the very features you value can quickly morph into formidable threats, leading to security vulnerabilities, misinformation campaigns, and unforeseen ethical dilemmas.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font style="font-size: 15px;" face="Rubik"&gt;This nuanced challenge to privacy is enhanced by insider threats, which often stem from either human error or malicious intent. Sometimes, malicious attempts to compromise an organization can be inadvertently thwarted due to the perpetrator's sheer ignorance of what critical data they can access. However, in today's reality where data sprawl is rampant and permissions management becomes increasingly complex, Generative AI could unintentionally facilitate privacy breaches. Operating autonomously, it may grant unauthorized access or usage of sensitive information, escalating the risk of data breaches. To go a step further, as AI tools become more sophisticated and adapt within these lax ecosystems, they might inadvertently widen the impact of insider threats, accessing critical data that would otherwise remain undiscovered. Navigating these complexities requires tech leaders to practice stringent supervision of data stores, ensuring AI is employed within strict parameters to uphold privacy and safeguard data integrity.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font style="font-size: 15px;" face="Rubik" color="#057091"&gt;&lt;strong&gt;Common Pitfalls of Unchecked Generative AI&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font style="font-size: 15px;" face="Rubik"&gt;The pitfalls of unchecked Generative AI are as varied as they are significant. Take, for instance, the case where a seemingly innocuous mistake by an executive assistant—sharing an executive folder via a collaboration link—became an open vault for anyone within the organization. This misstep led to a critical breach when a departing, disgruntled employee exploited the oversight. The worker harnessed the capabilities of a Generative AI Assistant, Microsoft Copilot, to ingeniously request and obtain sensitive data including executive compensation details, family trust documents, and personally identifiable information (PII) of the organization's leaders.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font style="font-size: 15px;" face="Rubik"&gt;Such incidents underline the multifaceted nature of threats posed by unregulated Generative AI. They are not confined to the direct actions of the AI itself, but also encompass how it can be maneuvered to fulfill harmful intentions—especially when combined with human ingenuity and malcontent. This unpredictability of AI-assisted threats adds an intricate layer to the already complex challenge of safeguarding against data breaches, emphasizing the need for rigorous AI governance protocols within any enterprise.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font style="font-size: 15px;" face="Rubik" color="#057091"&gt;&lt;strong&gt;Strategic Steps to Mitigate Risks&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font style="font-size: 15px;" face="Rubik"&gt;To effectively manage Generative AI and maintain security integrity, technology leaders should consider implementing the following strategic measures:&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;span style=""&gt;&lt;font style="font-size: 15px;"&gt;&lt;font face="Rubik" style=""&gt;&lt;strong&gt;&lt;em&gt;1. Adopt a Least Privilege Model:&lt;/em&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/font&gt;&lt;/span&gt;&lt;/p&gt;

&lt;div style="margin-left: 2em"&gt;
  &lt;ul&gt;
    &lt;li&gt;&lt;span&gt;&lt;font style="font-size: 15px;" face="Rubik"&gt;Restrict access to data strictly on a need-to-know basis.&lt;/font&gt;&lt;/span&gt;&lt;/li&gt;

    &lt;li style="line-height: 17px;"&gt;&lt;font style="font-size: 15px;" face="Rubik"&gt;Regularly review and adjust permissions to minimize unnecessary access.&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font style="font-size: 15px;" face="Rubik"&gt;&lt;font&gt;&lt;strong&gt;&amp;nbsp;&lt;em&gt;2.&amp;nbsp;&lt;/em&gt;&lt;/strong&gt;&lt;/font&gt;&lt;span style=""&gt;&lt;font style=""&gt;&lt;strong&gt;&lt;em&gt;Establish Robust Ethical Guidelines:&lt;/em&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;div style="margin-left: 2em"&gt;
  &lt;ul&gt;
    &lt;li&gt;&lt;span&gt;&lt;font style="font-size: 15px;" face="Rubik"&gt;Draft and enforce clear policies on AI's decision-making boundaries.&lt;/font&gt;&lt;/span&gt;&lt;/li&gt;

    &lt;li style="line-height: 17px;"&gt;&lt;font style="font-size: 15px;" face="Rubik"&gt;Create protocols for swift intervention if AI actions deviate from norms.&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font style="font-size: 15px;" face="Rubik"&gt;&lt;strong&gt;&lt;em&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;span style=""&gt;&lt;font style=""&gt;3. Deploy AI Monitoring Tools:&lt;/font&gt;&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;div style="margin-left: 2em"&gt;
  &lt;ul&gt;
    &lt;li&gt;&lt;span&gt;&lt;font style="font-size: 15px;" face="Rubik"&gt;Implement systems for real-time oversight of AI activities.&lt;/font&gt;&lt;/span&gt;&lt;/li&gt;

    &lt;li style="line-height: 17px;"&gt;&lt;font style="font-size: 15px;" face="Rubik"&gt;Ensure traceability of AI actions to their sources for accountability.&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font style="font-size: 15px;" face="Rubik"&gt;&lt;strong&gt;&lt;em&gt;&lt;font&gt;&amp;nbsp;4.&amp;nbsp;&lt;/font&gt;&lt;span style=""&gt;&lt;font style=""&gt;Integrate AI Risk Assessments:&lt;/font&gt;&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;div style="margin-left: 2em"&gt;
  &lt;ul&gt;
    &lt;li&gt;&lt;span&gt;&lt;font style="font-size: 15px;" face="Rubik"&gt;Incorporate AI threat evaluations into existing security frameworks.&lt;/font&gt;&lt;/span&gt;&lt;/li&gt;

    &lt;li style="line-height: 17px;"&gt;&lt;font style="font-size: 15px;" face="Rubik"&gt;Develop proactive strategies to respond to anticipated AI vulnerabilities.&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font style="font-size: 15px;" face="Rubik"&gt;&lt;strong&gt;&lt;em&gt;&lt;font&gt;&amp;nbsp;5.&amp;nbsp;&lt;/font&gt;&lt;span style=""&gt;&lt;font style=""&gt;Educate and Train Staff:&lt;/font&gt;&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;div style="margin-left: 2em"&gt;
  &lt;ul&gt;
    &lt;li&gt;&lt;span&gt;&lt;font style="font-size: 15px;" face="Rubik"&gt;Conduct regular training sessions on the benefits and risks of Generative AI.&lt;/font&gt;&lt;/span&gt;&lt;/li&gt;

    &lt;li style="line-height: 17px;"&gt;&lt;font style="font-size: 15px;" face="Rubik"&gt;Promote a company-wide culture of AI awareness and responsible use.&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font style="font-size: 15px;" face="Rubik"&gt;These actionable steps provide a comprehensive framework for mitigating the risks associated with Generative AI, promoting ethical use, and fostering an environment of informed vigilance.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font style="font-size: 15px;" face="Rubik" color="#057091"&gt;&lt;strong&gt;Charting a Safer Course: The Imperative of AI Governance&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font style="font-size: 15px;" face="Rubik"&gt;We truly do stand at a crossroads of innovation and responsibility. It’s clear that unchecked use of Generative AI tools presents formidable risks alongside their tremendous upside for productivity. The incidents and challenges we've discussed underscore how essential it is to take a proactive risk management approach when deploying Generative AI in your ecosystem.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font style="font-size: 15px;" face="Rubik"&gt;To ensure the ethical deployment of AI, it is imperative to establish and uphold stringent ethical guidelines. These guidelines act as the compass that guides AI behavior, ensuring that it aligns with your values and ethical standards. Additionally, investing in comprehensive education and training programs is not just about risk avoidance but also about empowering your team to leverage AI responsibly and effectively.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font style="font-size: 15px;" face="Rubik"&gt;By reinforcing these two pillars—ethical guidelines and continuous learning—you cultivate a knowledgeable and principled workforce. Strengthen your AI oversight and educate your teams on how to safely utilize AI tools. By taking these decisive steps, you will not only protect your organization but also position it to thrive, deploying AI with precision and security.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;" align="center"&gt;&lt;font style="font-size: 15px;" face="Rubik"&gt;****&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font style="font-size: 12px;" face="Rubik"&gt;&lt;strong style=""&gt;&lt;em style=""&gt;Bio&lt;/em&gt;&lt;/strong&gt;&lt;em style=""&gt;: Ramone Kenney brings over 13 years of expertise in providing technology solutions to complex challenges. As Manager of Enterprise Accounts, specializing in Cyber Security for Varonis, he is instrumental in overseeing the deployment and implementation of robust data security measures. Ramone is committed to leading the charge in risk reduction initiatives, ensuring that his clients are safeguarded against ever-evolving digital threats.&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;

&lt;div style="margin-left: 2em"&gt;&lt;/div&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13348156</link>
      <guid>https://www.technologyfirst.org/Tech-News/13348156</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Wed, 27 Mar 2024 14:48:52 GMT</pubDate>
      <title>Elevating Leadership and Bridging Digital Skills</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/Kalen%20Howell%20Blog.svg" alt="" title="" border="0"&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;" color="#01507A"&gt;&lt;strong style=""&gt;Embracing AI in Leadership&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#4D5758" face="Verdana, sans-serif" style="font-size: 16px;"&gt;In November 2023, I presented to and spoke with a group of technologists on the topic of “Embracing AI in Leadership.” The mission was to open people’s eyes to the possibilities of enhancing their own growth potential in their leadership journey by utilizing Generative AI. This included real case studies, several Gen AI tools, and various prompting techniques. Where there were a few skeptics at the beginning of the presentation, in the end, they were converted into believers. Task completed? Well, I think this journey is and will be a work in progress for the foreseeable future.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#4D5758" face="Verdana, sans-serif" style="font-size: 16px;"&gt;My decision to delve into this topic was driven by multiple inspirations. First among them was witnessing the widening divide between the technologically empowered and the underserved. My journey from blue-collar sectors to the forefront of the tech industry has confirmed and validated the idea that there are boundless opportunities that technology can offer. Yet, it has also highlighted a stark reality: as technology progresses, the chasm deepens between those who continuously evolve with technology and those who remain disconnected. This disparity, especially with the advent of easily accessible Generative AI, is set to expand even more rapidly, distinguishing between the adopters of AI and those left behind.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Cambria, serif" style="font-size: 16px;"&gt;&lt;font color="#4D5758" face="Verdana, sans-serif"&gt;Setting AI aside for the moment,&lt;/font&gt;&amp;nbsp;&lt;a href="https://fpov.com/scott-klososky-bio/"&gt;&lt;font color="#4D5758" face="Verdana, sans-serif"&gt;Scott Klososky&lt;/font&gt;&lt;/a&gt;&amp;nbsp;&lt;font color="#4D5758" face="Verdana, sans-serif"&gt;points out that we have an existing problem. Even amongst well-established organizations, there are&lt;/font&gt;&amp;nbsp;&lt;a href="https://fpov.com/2024/02/27/what-is-the-digital-skills-gap-and-how-much-is-it-costing-enterprises/"&gt;&lt;font color="#4D5758" face="Verdana, sans-serif"&gt;digital skills gaps that incur massive hidden costs&lt;/font&gt;&lt;/a&gt;&lt;font color="#4D5758" face="Verdana, sans-serif"&gt;. I have witnessed this myself at multiple organizations over the past several years. For instance, many individuals remain reliant on their mapped network drives for accessing and managing shared content. Mapped network drives have been around for a very long time. At the risk of opening myself up to rebuke, I’ll go ahead and say it, this is old-school technology, pre-cloud, pre-OneDrive, and pre-modern-tech.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#4D5758" face="Verdana, sans-serif" style="font-size: 16px;"&gt;On one hand, some IT departments have invested heavily to ensure access to their mapped drives and shared content is seamless. On the other hand, many users experience frustration with the less-than-optimal method of working with their content, especially when on the move. What makes this worse is these same organizations have also invested in Microsoft 365 (M365), a comprehensive digital workplace. Yet 80% or more of users are still locked in their old-school processes that revolve around their mapped drives (&lt;em&gt;these are my unofficial stats&lt;/em&gt;).&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Cambria, serif" style="font-size: 16px;"&gt;&lt;font color="#4D5758" face="Verdana, sans-serif"&gt;This scenario underscores a missed opportunity to leverage existing resources more effectively and highlights the pressing need to address the digital skills gap within the organization. As&lt;/font&gt;&amp;nbsp;&lt;a href="https://fpov.com/2024/02/27/what-is-the-digital-skills-gap-and-how-much-is-it-costing-enterprises/"&gt;&lt;font color="#4D5758" face="Verdana, sans-serif"&gt;Scott points out&lt;/font&gt;&lt;/a&gt;&lt;font color="#4D5758" face="Verdana, sans-serif"&gt;, the organization is responsible for closing the digital skills gap or suffer the resulting cost of a lack of efficiency and effectiveness.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Cambria, serif" style="font-size: 16px;"&gt;&lt;font face="Verdana, sans-serif"&gt;&lt;strong style=""&gt;&lt;font color="#01507A"&gt;Get Your Digital House in Orde&lt;/font&gt;&lt;font color="#01507A"&gt;r&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Cambria, serif" style="font-size: 16px;"&gt;&lt;font color="#4D5758" face="Verdana, sans-serif"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Switching back to the AI topic. If your organization already has a detrimental digital skills gap, you have some work to do as a technology leader. Embracing AI in Leadership is based on the idea that, conceptually, you can use generative AI to improve your leadership capabilities, including strategic thinking, future-scenario simulations, enhanced research capabilities, and potentially help you devise a strategy and plan for closing the digital skills gap in your organization. I took a few minutes working with ChatGPT to generate the following high-level strategy as a good starting point to consider.&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;table cellspacing="0" cellpadding="0" width="87%" style="border-width: 1px; border-style: solid; border-color: initial; border-collapse: collapse;"&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td width="144" valign="top" style="border-style: solid; border-width: 1px;"&gt;
        &lt;p align="center"&gt;&lt;font face="Cambria, serif" style="font-size: 16px;"&gt;&lt;strong&gt;&lt;font face="Verdana, sans-serif" color="#01507A"&gt;Strategy Component&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;
      &lt;/td&gt;

      &lt;td width="234" valign="top" style="border-style: solid; border-width: 1px;"&gt;
        &lt;p align="center"&gt;&lt;font face="Cambria, serif" style="font-size: 16px;"&gt;&lt;strong&gt;&lt;font face="Verdana, sans-serif" color="#01507A"&gt;Action Items&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;
      &lt;/td&gt;

      &lt;td width="180" valign="top" style="border-style: solid; border-width: 1px;"&gt;
        &lt;p align="center"&gt;&lt;font face="Cambria, serif" style="font-size: 16px;"&gt;&lt;strong&gt;&lt;font face="Verdana, sans-serif" color="#01507A"&gt;Expected Outcomes&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;
      &lt;/td&gt;
    &lt;/tr&gt;

    &lt;tr&gt;
      &lt;td width="144" valign="top" style="border-style: solid; border-width: 1px;"&gt;
        &lt;p&gt;&lt;font face="Cambria, serif" style="font-size: 16px;"&gt;&lt;strong&gt;&lt;font face="Verdana, sans-serif"&gt;Baseline Digital Skills Assessment&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;
      &lt;/td&gt;

      &lt;td width="234" valign="top" style="border-style: solid; border-width: 1px;"&gt;
        &lt;p&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;- Assess to identify skills gaps.&lt;br&gt;
        - Benchmark against industry.&lt;/font&gt;&lt;/p&gt;
      &lt;/td&gt;

      &lt;td width="180" valign="top" style="border-style: solid; border-width: 1px;"&gt;
        &lt;p&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;- Clear understanding of skills gaps.&lt;br&gt;
        - Identified improvement areas.&lt;/font&gt;&lt;/p&gt;
      &lt;/td&gt;
    &lt;/tr&gt;

    &lt;tr&gt;
      &lt;td width="144" valign="top" style="border-style: solid; border-width: 1px;"&gt;
        &lt;p&gt;&lt;font face="Cambria, serif" style="font-size: 16px;"&gt;&lt;strong&gt;&lt;font face="Verdana, sans-serif"&gt;Customized Learning Pathways&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;
      &lt;/td&gt;

      &lt;td width="234" valign="top" style="border-style: solid; border-width: 1px;"&gt;
        &lt;p&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;- Develop role-specific pathways.&lt;br&gt;
        - Utilize AI for personalized learning.&lt;/font&gt;&lt;/p&gt;
      &lt;/td&gt;

      &lt;td width="180" valign="top" style="border-style: solid; border-width: 1px;"&gt;
        &lt;p&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;- Role-relevant skills improvement.&lt;br&gt;
        - Higher engagement.&lt;/font&gt;&lt;/p&gt;
      &lt;/td&gt;
    &lt;/tr&gt;

    &lt;tr&gt;
      &lt;td width="144" valign="top" style="border-style: solid; border-width: 1px;"&gt;
        &lt;p&gt;&lt;font face="Cambria, serif" style="font-size: 16px;"&gt;&lt;strong&gt;&lt;font face="Verdana, sans-serif"&gt;Leverage Existing Technologies&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;
      &lt;/td&gt;

      &lt;td width="234" valign="top" style="border-style: solid; border-width: 1px;"&gt;
        &lt;p&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;- Train with Microsoft 365.&lt;br&gt;
        - Workshops for new tech adoption.&lt;/font&gt;&lt;/p&gt;
      &lt;/td&gt;

      &lt;td width="180" valign="top" style="border-style: solid; border-width: 1px;"&gt;
        &lt;p&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;- Improved tool utilization.&lt;br&gt;
        - Reduced outdated tech reliance.&lt;/font&gt;&lt;/p&gt;
      &lt;/td&gt;
    &lt;/tr&gt;

    &lt;tr&gt;
      &lt;td width="144" valign="top" style="border-style: solid; border-width: 1px;"&gt;
        &lt;p&gt;&lt;font face="Cambria, serif" style="font-size: 16px;"&gt;&lt;strong&gt;&lt;font face="Verdana, sans-serif"&gt;Promote a Culture of Continuous Learning&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;
      &lt;/td&gt;

      &lt;td width="234" valign="top" style="border-style: solid; border-width: 1px;"&gt;
        &lt;p&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;- Reward learning achievements.&lt;br&gt;
        - Foster knowledge sharing and mentoring.&lt;/font&gt;&lt;/p&gt;
      &lt;/td&gt;

      &lt;td width="180" valign="top" style="border-style: solid; border-width: 1px;"&gt;
        &lt;p&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;- Learning as a core value.&lt;br&gt;
        - Supportive learning environment.&lt;/font&gt;&lt;/p&gt;
      &lt;/td&gt;
    &lt;/tr&gt;

    &lt;tr&gt;
      &lt;td width="144" valign="top" style="border-style: solid; border-width: 1px;"&gt;
        &lt;p&gt;&lt;font face="Cambria, serif" style="font-size: 16px;"&gt;&lt;strong&gt;&lt;font face="Verdana, sans-serif"&gt;Generative AI in Leadership Development&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;
      &lt;/td&gt;

      &lt;td width="234" valign="top" style="border-style: solid; border-width: 1px;"&gt;
        &lt;p&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;- Integrate AI for planning and simulations.&lt;br&gt;
        - AI training for leaders.&lt;/font&gt;&lt;/p&gt;
      &lt;/td&gt;

      &lt;td width="180" valign="top" style="border-style: solid; border-width: 1px;"&gt;
        &lt;p&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;- Enhanced leadership skills.&lt;br&gt;
        - Better planning capabilities.&lt;/font&gt;&lt;/p&gt;
      &lt;/td&gt;
    &lt;/tr&gt;

    &lt;tr&gt;
      &lt;td width="144" valign="top" style="border-style: solid; border-width: 1px;"&gt;
        &lt;p&gt;&lt;font face="Cambria, serif" style="font-size: 16px;"&gt;&lt;strong&gt;&lt;font face="Verdana, sans-serif"&gt;Continuous Feedback and Adaptation&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;
      &lt;/td&gt;

      &lt;td width="234" valign="top" style="border-style: solid; border-width: 1px;"&gt;
        &lt;p&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;- Feedback loops for learning effectiveness.&lt;br&gt;
        - Update materials based on feedback.&lt;/font&gt;&lt;/p&gt;
      &lt;/td&gt;

      &lt;td width="180" valign="top" style="border-style: solid; border-width: 1px;"&gt;
        &lt;p&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;- Agile adaptation to tech changes.&lt;br&gt;
        - Skills aligned with goals.&lt;/font&gt;&lt;/p&gt;
      &lt;/td&gt;
    &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;

&lt;p&gt;&lt;font face="Calibri, sans-serif" style="font-size: 16px;"&gt;&lt;font face="Verdana, sans-serif" color="#01507A"&gt;&lt;strong style=""&gt;Beyond the Skills Gap: Paving the Way for AI and Digital Innovation&lt;/strong&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#4D5758" face="Verdana, sans-serif" style="font-size: 16px;"&gt;This strategy lays the foundation for AI adoption and other technological advancements, while addressing the digital skills gap is crucial, it’s just one aspect. Organizations are embarking on extensive digital transformation, adopting advanced ERP systems, shifting to cloud-based development, enhancing cybersecurity, and establishing robust disaster recovery plans. Amidst these transformations, businesses strive to excel, balancing multiple initiatives seamlessly in their dynamic operations.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#4D5758" face="Verdana, sans-serif" style="font-size: 16px;"&gt;As a technology leader, prioritize delivering high-quality digital transformations, using AI judiciously to augment your leadership and ensure initiatives remain focused and effective, without diluting quality or mission clarity. At some point, your organization might consider tackling AI head-on. For example, evaluating viable use cases, considering deploying your own Large Language Model (LLM) internally, training or fine-tuning your models using your own proprietary data, and then figuring out how to production-ize AI solutions. As you prepare for this new initiative, find the right partner and hire or train the right leaders who can devote 100% of their effort to AI. You will need leadership, experience, and a team to tackle this new space.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;" color="#01507A"&gt;&lt;strong style=""&gt;In Conclusion&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Cambria, serif" style="font-size: 16px;"&gt;&lt;font color="#4D5758" face="Verdana, sans-serif"&gt;As we explore “Embracing AI in Leadership” and tackle the digital skills gap alongside our digital transformation efforts, the journey is both challenging and filled with opportunities. Fostering a culture of continuous learning and adaptability is key to not just bridging the digital divide but thriving in the era of rapid technological advancement. Our ongoing endeavor is to leverage technology to enhance our leadership, improve operations, and drive organizational growth in a world where technology continuously reshapes our landscape.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;&lt;font color="#4D5758" face="Verdana, sans-serif"&gt;Bio:&lt;/font&gt;&lt;font face="Calibri, sans-serif"&gt;&amp;nbsp;&lt;/font&gt;&lt;font color="#4D5758" face="Verdana, sans-serif"&gt;Kalen Howell has a master's degree in computer science from Franklin University and an MBA from the University of Dayton and has worked in the software development industry for over 20 years. Today, as CIO, Kalen leads a technology team, IT OPS, and Software Development, with huge digital initiatives rolling out to organizations across the US, Canada, and Mexico.&lt;/font&gt;&lt;/font&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13335377</link>
      <guid>https://www.technologyfirst.org/Tech-News/13335377</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Wed, 27 Mar 2024 14:44:41 GMT</pubDate>
      <title>Making Generative AI Accessible: Anyone Can Do This</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/Eric%20Crouch%20Blog.svg" alt="" title="" border="0"&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" style="font-size: 14px;"&gt;My youngest son has no fear of technology and, until recently, no programming experience. That dramatically changed when his logistics professor asked his business school students to build an interactive digital map of the world depicting the sourcing, manufacturing, shipping, and receiving patterns for a fictitious, complex supply chain case study.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" style="font-size: 14px;"&gt;My son, in a few days, used an Excel data file and OpenAI’s GPT-4 to create and edit code in RStudio and build the interactive model. This exemplifies the democratization of skills previously accessible only to a subset of the population.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Calibri, sans-serif"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 14px;"&gt;As a result, we are going to see an explosion of innovation as creative people around the globe tap into this power.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Calibri, sans-serif"&gt;&lt;strong&gt;&lt;font face="Verdana, sans-serif" style="font-size: 14px;" color="#01507A"&gt;Applying AI to Solve Healthcare Problems&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Calibri, sans-serif"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 14px;"&gt;In healthcare, we've leveraged algorithm-based machine learning for years. Our primary applications in imaging studies have quickly identified tissue abnormalities, genetic assessments to understand the future risk of cancer, and predictive models to catch infections early so they can be treated before becoming life-threatening.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Calibri, sans-serif"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 14px;"&gt;Generative AI is going to positively impact healthcare, and Kettering Health will see initial benefits in three areas:&amp;nbsp;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;div style="margin-left: 2em"&gt;
  &lt;ul&gt;
    &lt;li&gt;&lt;font face="Calibri, sans-serif" style="font-size: 14px;"&gt;&lt;strong&gt;&lt;font face="Verdana, sans-serif"&gt;Provider workload:&lt;/font&gt;&lt;/strong&gt; &lt;font face="Verdana, sans-serif"&gt;Chart summaries can be automatically prepared to share with the patient or referring provider. Inbox assistants help the clinician quickly reply to patient questions.&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;div style="margin-left: 2em"&gt;
  &lt;ul&gt;
    &lt;li&gt;&lt;font face="Calibri, sans-serif" style="font-size: 14px;"&gt;&lt;strong&gt;&lt;font face="Verdana, sans-serif"&gt;Rare disease management:&lt;/font&gt;&lt;/strong&gt; &lt;font face="Verdana, sans-serif"&gt;Analytics assistants will help clinicians find other patients with rare symptoms like the ones they are treating and help the clinician connect with that care team so a treatment plan can be developed.&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;

  &lt;ul&gt;
    &lt;li&gt;&lt;font face="Calibri, sans-serif" style="font-size: 14px;"&gt;&lt;strong&gt;&lt;font face="Verdana, sans-serif"&gt;Revenue cycle efficiency:&lt;/font&gt;&lt;/strong&gt; &lt;font face="Verdana, sans-serif"&gt;Existing automation opportunities will be enhanced to increase the efficiency of burdensome diagnostic coding and billing processes.&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" style="font-size: 14px;"&gt;Most healthcare organizations don't have the deep pockets needed to invest in this technology to be on the cutting edge. But the good news is that Epic (our electronic healthcare record systems partner) and Microsoft are making huge investments in generative AI.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Calibri, sans-serif"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 14px;"&gt;Because of that, we can partner with our providers to prototype features in the three areas I listed to determine which are the most valuable, integrate them into their workflows, and then continue to learn as more practical applications are developed.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Calibri, sans-serif"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 14px;"&gt;Our first serious venture into generative AI is to use it to assist our physicians to select the appropriate diagnosis codes while charting, saving time and increasing accuracy. We are piloting a solution in one of our hospitals—with plans to scale throughout our system’s acute locations.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Calibri, sans-serif"&gt;&lt;strong&gt;&lt;font face="Verdana, sans-serif" style="font-size: 14px;" color="#01507A"&gt;It’s More Than Hype&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" style="font-size: 14px;"&gt;This technology is exciting, and no one is completely sure of its future benefits. We’ve seen careless accelerated approaches to adopting AI lead many organizations, across all industries, into the troubled waters of IP law, copyright infringement, plagiarism, and even moral calamity.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" style="font-size: 14px;"&gt;However, as my son’s experience illustrates, the potential value is real.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Calibri, sans-serif"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 14px;"&gt;I look forward to when more of us adopt these skills and move beyond generative AI applications that save time or reduce the burden of repetitive tasks to truly life-enhancing innovations for our community.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" style="font-size: 12px;"&gt;&lt;strong style=""&gt;&lt;font face="Verdana, sans-serif" style=""&gt;Bio&lt;/font&gt;&lt;/strong&gt;&lt;font face="Verdana, sans-serif" style=""&gt;: Eric Crouch serves as the Chief Information Officer (CIO) and Vice President for Information Services at Kettering Health. He oversees the strategic planning, implementation, and management of information technology and digital transformation initiatives. The people at Kettering Health serve in medical centers and outpatient locations throughout western Ohio and are dedicated to elevating the health, healing, and hope of the community.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13335370</link>
      <guid>https://www.technologyfirst.org/Tech-News/13335370</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Wed, 27 Mar 2024 14:36:21 GMT</pubDate>
      <title>What’s all the Fuss about Quantum Computing?</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/Dave%20Hatter%20Blog.svg" alt="" title="" border="0"&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Quantum computing is a massive leap forward in computational capabilities potentially revolutionizing whole industries and solving previously intractable problems. Quantum computing relies on highly specialized technology (hardware and algorithms) that takes advantage of&lt;/font&gt; &lt;font face="Verdana, sans-serif" color="#000000" style="font-size: 16px;"&gt;&lt;a href="https://www.britannica.com/science/quantum-mechanics-physics"&gt;&lt;font color="#467886"&gt;quantum mechanics&lt;/font&gt;&lt;/a&gt;&lt;/font&gt; &lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;to process information in ways that would have been considered science fiction not long ago. Quantum computers can solve extraordinarily complex problems that even supercomputers can’t solve in a reasonable amount of time, like before the sun burns out. Let’s take a deeper look at quantum computing.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Aptos, sans-serif"&gt;&lt;strong&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;" color="#01507A"&gt;What is quantum computing?&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Quantum computers use quantum bits, or&lt;/font&gt; &lt;font face="Verdana, sans-serif" color="#000000" style="font-size: 16px;"&gt;&lt;a href="https://quantum.microsoft.com/en-us/explore/concepts/what-is-a-qubit"&gt;&lt;font color="#467886"&gt;qubits&lt;/font&gt;&lt;/a&gt;,&lt;/font&gt; &lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;as basic informational units. Unlike traditional bits which can represent either 0 or 1, a qubit can exist in a state of 0, 1, or both at the same time thanks to the quantum phenomenon known as&lt;/font&gt; &lt;font face="Verdana, sans-serif" color="#000000" style="font-size: 16px;"&gt;&lt;a href="https://quantum.microsoft.com/en-us/explore/concepts/superposition"&gt;&lt;font color="#467886"&gt;superposition&lt;/font&gt;&lt;/a&gt;.&lt;/font&gt; &lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;This allows quantum computers to explore multiple possibilities simultaneously, and in conjunction with other quantum phenomena such as &lt;a href="https://quantum.microsoft.com/en-us/explore/concepts/entanglement" style="color: rgb(0, 0, 0);"&gt;&lt;font color="#467886"&gt;entanglement&lt;/font&gt;&lt;/a&gt; &lt;font&gt;and&lt;/font&gt; &lt;a href="https://quantum.microsoft.com/en-us/explore/concepts/interference" style="color: rgb(0, 0, 0);"&gt;&lt;font color="#467886"&gt;interference&lt;/font&gt;&lt;/a&gt;&lt;font color="#000000"&gt;,&lt;/font&gt; &lt;font&gt;solve highly complex problems much faster than traditional computers.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;The quantum theory of physics was born in 1900 when physicist Max Planck published his study on the effect of radiation on a “blackbody” substance. As a subset of quantum physics, quantum computing is a relatively new field. It began to take off in 1994 when Peter Shor developed a quantum algorithm for factoring integers with the potential to crack public-key encryption schemes such as RSA or ECC. Astounding progress has been made in the decades since, major milestones include:&lt;/font&gt;&lt;/p&gt;

&lt;div style="margin-left: 2em"&gt;
  &lt;ul&gt;
    &lt;li&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;1995: David Deutsch and Richard Jozsa demonstrate the first quantum algorithm that can outperform any traditional algorithm on a specific problem.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;1996: Lov Grover invents a quantum search algorithm that sports a quadratic performance improvement over traditional algorithms.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;2001: IBM builds the first quantum computer to execute Shor's algorithm.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;2007: D-Wave Systems demonstrated the first commercial quantum computer.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;2019: Google claims&lt;/font&gt; &lt;font face="Verdana, sans-serif" color="#000000" style="font-size: 16px;"&gt;&lt;a href="https://wp.quantumcomputinginc.com/blog/quantum-advantage/"&gt;&lt;font color="#467886"&gt;quantum supremacy&lt;/font&gt;&lt;/a&gt;&lt;/font&gt; &lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;by performing a random circuit sampling in 200 seconds versus 10,000 years on a state-of-the-art supercomputer.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;2020: IBM announces&lt;/font&gt; &lt;font face="Verdana, sans-serif" color="#000000" style="font-size: 16px;"&gt;&lt;a href="https://wp.quantumcomputinginc.com/blog/quantum-advantage/"&gt;&lt;font color="#467886"&gt;quantum advantage&lt;/font&gt;&lt;/a&gt;&lt;/font&gt; &lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;by performing a financial portfolio optimization task in 2 minutes versus 6 hours on a state-of-the-art supercomputer.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;2020: China achieves quantum supremacy by performing a Gaussian boson sampling task in 200 seconds versus 2.5 billion years on a state-of-the-art supercomputer.&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;2023: IBM announces plans to build a 100,000-qubit machine that will work alongside traditional supercomputers to achieve breakthroughs in drug discovery and other advanced applications.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Quantum computing technology continues to advance rapidly. Industry leaders such as IBM, Google, and D-Wave, as well as academic institutions and startups continue to push the boundaries of what's possible. Currently, most work in the field is focused on reducing error rates, developing error correcting algorithms, increasing the number of qubits, and improving qubit coherence times which is length of time a qubit can maintain quantum state.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Aptos, sans-serif"&gt;&lt;strong&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;" color="#01507A"&gt;Common Benefits of Quantum Computing&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;The advent of quantum computing brings a host of benefits including:&lt;/font&gt;&lt;/p&gt;

&lt;div style="margin-left: 2em"&gt;
  &lt;ul&gt;
    &lt;li&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Speed: Quantum computers can solve certain problems exponentially faster than traditional computers. Shor's algorithm could factor a 2,048-bit number in about 10 minutes, versus billions of years on a traditional supercomputer. It’s worth noting that this has raised strong concerns about the future of encryption.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Efficiency: Quantum computers can solve certain complex problems with fewer resources than traditional computers.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Power: Quantum computers can manage more complex problems, even problems that were previously unsolvable.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Security: Quantum computing introduces new paradigms in encryption.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Innovation: Quantum computing enables breakthroughs by handling extraordinarily complex simulations and calculations that are impractical if not impossible for traditional computers.&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;p&gt;&lt;font face="Aptos, sans-serif"&gt;&lt;strong&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;" color="#01507A"&gt;Common Challenges of Quantum Computing&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Quantum computing is not without challenges, including:&lt;/font&gt;&lt;/p&gt;

&lt;div style="margin-left: 2em"&gt;
  &lt;ul&gt;
    &lt;li&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Hardware: Quantum computers are complex, expensive and difficult to build and operate. They currently require extreme cooling and specialized equipment to maintain the quantum states of qubits, making them impractical for widespread use.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Software: Quantum computing requires new programming languages, algorithms, and tools.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Threats: Quantum computing poses a significant threat to current cryptographic standards putting vast amounts of sensitive data at risk.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Technical Challenges: Quantum computing is an immature and rapidly advancing field. Error rates and qubit coherence must be overcome to fully realize quantum computing’s benefits.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Ethics: Quantum computing poses profound social and ethical implications. It creates the potential for new forms of power and influence, as well as new forms of harm, inequality, and conflict. For additional insights, check out this article from Deloitte&lt;/font&gt; &lt;font face="Verdana, sans-serif" color="#000000" style="font-size: 16px;"&gt;“&lt;a href="https://www2.deloitte.com/uk/en/insights/topics/cyber-risk/quantum-computing-ethics-risks.html"&gt;&lt;font color="#467886"&gt;Quantum computing may create ethical risks for businesses. It’s time to prepare&lt;/font&gt;&lt;/a&gt;”.&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;p&gt;&lt;font face="Aptos, sans-serif"&gt;&lt;strong style=""&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;" color="#01507A"&gt;How Quantum Computing Is Currently Used&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;div style="margin-left: 2em"&gt;
  &lt;ul&gt;
    &lt;li&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Despite challenges and concerns, quantum computing has the potential to revolutionize industries including artificial intelligence, physics, medicine, chemistry, logistics, finance, cryptography and more. Current applications for quantum computing include:&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Advanced simulations: Quantum computers could simulate the behavior of molecules, atoms, and subatomic particles leading to breakthroughs in the design of new materials, drugs, and energy sources.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Optimization: Quantum computers could tackle complex optimization problems that require finding the best solution from a vast number of possibilities. Examples include scheduling, routing, and planning.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Accelerating machine learning: Quantum computers could enhance the performance and capabilities of machine learning models through faster training, better accuracy, and less complexity.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Cracking encryption: Quantum algorithms like Shor’s pose a significant threat to data secured by current encryption schemes. Cybersecurity experts have speculated that adversarial nation state actors (APTs) are collecting as much data as possible now knowing that quantum computing will soon make it feasible to crack current encryption schemes and unlock vast troves of stolen data.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Improving encryption: Quantum cryptography promises strong encryption that will be virtually unbreakable.&lt;/font&gt; &lt;font face="Verdana, sans-serif" color="#000000" style="font-size: 16px;"&gt;&lt;a href="https://www.nist.gov/news-events/news/2022/07/nist-announces-first-four-quantum-resistant-cryptographic-algorithms"&gt;&lt;font color="#467886"&gt;NIST has announced four post-quantum resistant encryption algorithms&lt;/font&gt;&lt;/a&gt;&lt;/font&gt; &lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;designed to withstand quantum attacks.&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;&lt;strong style="font-family: Aptos, sans-serif;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;" color="#01507A"&gt;Conclusion: Facing Our Quantum Future&lt;/font&gt;&lt;/strong&gt;&lt;br&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Quantum computing is a new paradigm that transcends the limits of traditional computing by harnessing the power of quantum physics to perform calculations that are impractical if not impossible for traditional binary based computers. While still in its developmental stages, quantum computing shows the potential to radically transform our world.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;For technology professionals, quantum computing presents unprecedented opportunities and challenges. Understanding its principles, applications, benefits, and risks will allow us to play a pivotal role in shaping this technology, addressing ethical concerns raised by it, and developing secure, equitable access to quantum technologies.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;The journey into the quantum future is just beginning, and its impact on society, science and the economy will be profound. It’s an exciting time to be alive and to be in tech as we now have the opportunity to shape this future and ensure the power of quantum computing achieves its most beneficial potential.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Aptos, sans-serif" style="font-size: 12px;"&gt;&lt;strong style=""&gt;&lt;font face="Verdana, sans-serif" style=""&gt;Bio:&lt;/font&gt;&lt;/strong&gt; &lt;font face="Verdana, sans-serif" style=""&gt;Dave Hatter – CISSP, CISA, CISM, CCSP, CSSLP, PMP, ITIL, is a cybersecurity consultant at&lt;/font&gt; &lt;a href="https://www.intrust-it.com/" style=""&gt;&lt;font face="Verdana, sans-serif"&gt;&lt;font&gt;Intrust IT.&lt;/font&gt;&lt;/font&gt;&lt;/a&gt; &lt;font face="Verdana, sans-serif" style=""&gt;Dave has more than 30 years’ experience in technology as a software engineer and cybersecurity consultant and has served as an adjunct professor at&lt;/font&gt; &lt;a href="https://www.cincinnatistate.edu" style="color: rgb(0, 0, 0);"&gt;&lt;font face="Verdana, sans-serif"&gt;&lt;font color="#467886"&gt;Cincinnati State&lt;/font&gt;&lt;/font&gt;&lt;/a&gt; &lt;font face="Verdana, sans-serif" style="color: rgb(0, 0, 0);"&gt;f&lt;/font&gt;&lt;font face="Verdana, sans-serif" style=""&gt;or nearly 20 years. He is a privacy advocate and an Advisory Board member of the&lt;/font&gt; &lt;a href="https://www.plunkfoundation.org/team" style="color: rgb(0, 0, 0);"&gt;&lt;font face="Verdana, sans-serif"&gt;&lt;font color="#467886"&gt;Plunk Foundation&lt;/font&gt;&lt;/font&gt;&lt;/a&gt;&lt;font face="Verdana, sans-serif" style="color: rgb(0, 0, 0);"&gt;. F&lt;/font&gt;&lt;font face="Verdana, sans-serif" style=""&gt;ollow Dave on X&lt;/font&gt; &lt;font face="Verdana, sans-serif" style="color: rgb(0, 0, 0);"&gt;(&lt;/font&gt;&lt;a href="https://twitter.com/davehatter" style="color: rgb(0, 0, 0);"&gt;&lt;font face="Verdana, sans-serif"&gt;&lt;font color="#467886"&gt;@DaveHatter&lt;/font&gt;&lt;/font&gt;&lt;/a&gt;&lt;font face="Verdana, sans-serif" style="color: rgb(0, 0, 0);"&gt;)&lt;/font&gt; &lt;font face="Verdana, sans-serif" style=""&gt;for timely and helpful technology news and tips.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13335367</link>
      <guid>https://www.technologyfirst.org/Tech-News/13335367</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Tue, 27 Feb 2024 18:26:24 GMT</pubDate>
      <title>Empowering Women in Tech through Skill-Based Education</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Newsletter/Demarus%20Crawford%20White%20Blog.png" alt="" title="" border="0"&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;span data-contrast="none"&gt;&lt;font&gt;&lt;span data-ccp-parastyle="Normal (Web)" style=""&gt;In the ever-evolving realm of technology, companies are beginning to realize that diversity and inclusion are critical factors for innovation and progress. Even with this new burgeoning era of understanding,&lt;/span&gt; &lt;span data-ccp-parastyle="Normal (Web)" style=""&gt;it's&lt;/span&gt; &lt;span data-ccp-parastyle="Normal (Web)" style=""&gt;clear that women, though brimming with potential, are still vastly underrepresented. Bridging this gender gap requires a concerted effort to empower, encourage, and lead women to pursue careers in technology. One impactful approach to this issue is through skill-based education, providing women with the tools and knowledge they need to excel in the world of tech. &lt;/span&gt;&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;span data-contrast="none"&gt;&lt;strong&gt;&lt;font color="#31C99A"&gt;The Gender Disparity in Tech &lt;/font&gt;&lt;/strong&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;span data-contrast="none"&gt;&lt;font&gt;&lt;span data-ccp-parastyle="Normal (Web)"&gt;Historically, the tech industry has been&lt;/span&gt; &lt;span data-ccp-parastyle="Normal (Web)"&gt;male dominated&lt;/span&gt;&lt;span data-ccp-parastyle="Normal (Web)"&gt;, with women&lt;/span&gt; &lt;span data-ccp-parastyle="Normal (Web)"&gt;comprising&lt;/span&gt; &lt;span data-ccp-parastyle="Normal (Web)"&gt;a small percentage of the workforce. This disparity is not due to a lack of interest or capability of women but is often attributed to systemic barriers and societal stereotypes that discourage them from pursuing tech-related careers. From high school advanced math programs that historically target males to pop culture and media consistently showing only men as the tech guru sidekicks who help the heroes outwit the villains, the narrative to women and young girls has been, “technology is not the space for you.” &lt;/span&gt;&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;span data-contrast="none"&gt;&lt;strong&gt;&lt;font&gt;&lt;font color="#31C99A"&gt;The Power of Skill-Based Education&lt;/font&gt; &lt;/font&gt;&lt;/strong&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;span data-contrast="none"&gt;&lt;font&gt;Skill-based education serves as a powerful equalizer. By focusing on tangible skills and hands-on learning, women can build the confidence and competence needed to break through barriers in the tech industry. It allows women to equip themselves with coding prowess, data analytics finesse, and cybersecurity wizardry through online courses, coding bootcamps, and engaging workshops, with much less financial cost. &lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;span data-contrast="none"&gt;&lt;strong&gt;&lt;font&gt;&lt;font color="#31C99A"&gt;Creating Inclusive Learning Environments&lt;/font&gt; &lt;/font&gt;&lt;/strong&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;span data-contrast="none"&gt;&lt;font&gt;&lt;span data-ccp-parastyle="Normal (Web)"&gt;Imagine this: vibrant communities, mentorship bonds, and initiatives celebrating the triumphs of women in tech.&lt;/span&gt; &lt;span data-ccp-parastyle="Normal (Web)"&gt;That's&lt;/span&gt; &lt;span data-ccp-parastyle="Normal (Web)"&gt;the environment we need to foster—one where diversity is not just acknowledged but celebrated. Educational institutions and organizations must actively break down biases within their curricula, ensuring that every woman feels seen and supported. &lt;/span&gt;&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;span data-contrast="none"&gt;&lt;strong&gt;&lt;font color="#31C99A"&gt;&lt;font&gt;Overcoming Stereotypes&lt;/font&gt; &lt;/font&gt;&lt;/strong&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;span data-contrast="none"&gt;&lt;font&gt;&lt;span data-ccp-parastyle="Normal (Web)"&gt;Let’s&lt;/span&gt; &lt;span data-ccp-parastyle="Normal (Web)"&gt;be candid; stereotypes often portray women as less suited for STEM fields, perpetuating the myth that certain professions are a man's world. But within the realm of skill-based education, we shatter these stereotypes, spotlighting the accomplishments of remarkable women who have not only excelled but thrived in tech. &lt;/span&gt;&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;span data-contrast="none"&gt;&lt;strong&gt;&lt;font color="#31C99A"&gt;Building Confidence Through Hands-On Experience&lt;/font&gt;&lt;font color="#31C4D3"&gt; &lt;/font&gt;&lt;/strong&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;span data-contrast="none"&gt;&lt;font&gt;&lt;span data-ccp-parastyle="Normal (Web)"&gt;One of the key benefits of skill-based education is the emphasis on practical, hands-on experience. By working on real-world projects, women can gain the confidence and&lt;/span&gt; &lt;span data-ccp-parastyle="Normal (Web)"&gt;expertise&lt;/span&gt; &lt;span data-ccp-parastyle="Normal (Web)"&gt;necessary to navigate the tech industry. This approach not only equips them with technical skills but also develops problem-solving abilities and critical thinking—strong qualities for success in any role. Studies have long shown women hesitating to apply for tech roles, even when their skills rival their male counterparts. Skill-based education addresses this by providing a clear pathway for women to develop and&lt;/span&gt; &lt;span data-ccp-parastyle="Normal (Web)"&gt;showcase&lt;/span&gt; &lt;span data-ccp-parastyle="Normal (Web)"&gt;their abilities. As they&lt;/span&gt; &lt;span data-ccp-parastyle="Normal (Web)"&gt;witness&lt;/span&gt; &lt;span data-ccp-parastyle="Normal (Web)"&gt;the tangible results of their learning, barriers begin to break down, and confidence soars. &lt;/span&gt;&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;span data-contrast="none" style=""&gt;&lt;strong&gt;&lt;font&gt;&lt;font color="#31C99A"&gt;Conclusion&lt;/font&gt; &lt;/font&gt;&lt;/strong&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}" style=""&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span data-contrast="none"&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;span data-ccp-parastyle="x_elementtoproof" data-ccp-parastyle-defn="{&amp;quot;ObjectId&amp;quot;:&amp;quot;2fd85e01-5e4e-4a76-aee6-926ad3893933|5&amp;quot;,&amp;quot;ClassId&amp;quot;:1073872969,&amp;quot;Properties&amp;quot;:[469775450,&amp;quot;x_elementtoproof&amp;quot;,201340122,&amp;quot;2&amp;quot;,134233614,&amp;quot;true&amp;quot;,469778129,&amp;quot;xelementtoproof&amp;quot;,335572020,&amp;quot;1&amp;quot;,469777841,&amp;quot;Times New Roman&amp;quot;,469777842,&amp;quot;Times New Roman&amp;quot;,469777843,&amp;quot;Times New Roman&amp;quot;,469777844,&amp;quot;Times New Roman&amp;quot;,469769226,&amp;quot;Times New Roman&amp;quot;,268442635,&amp;quot;24&amp;quot;,335559740,&amp;quot;240&amp;quot;,201341983,&amp;quot;0&amp;quot;,134233118,&amp;quot;true&amp;quot;,134233117,&amp;quot;true&amp;quot;,469778324,&amp;quot;Normal&amp;quot;]}" style=""&gt;Let's&lt;/span&gt; &lt;span data-ccp-parastyle="x_elementtoproof" style=""&gt;dismantle the barriers, champion diversity, and celebrate the triumphs of women in tech. By investing in skill development and&lt;/span&gt; &lt;span data-ccp-parastyle="x_elementtoproof" style=""&gt;providing&lt;/span&gt; &lt;span data-ccp-parastyle="x_elementtoproof" style=""&gt;accessible learning opportunities, we&lt;/span&gt; &lt;span data-ccp-parastyle="x_elementtoproof" style=""&gt;aren't&lt;/span&gt; &lt;span data-ccp-parastyle="x_elementtoproof" style=""&gt;just shaping individual success stories;&lt;/span&gt; &lt;span data-ccp-parastyle="x_elementtoproof" style=""&gt;we're&lt;/span&gt; &lt;span data-ccp-parastyle="x_elementtoproof" style=""&gt;creating a platform for women to stand shoulder to shoulder, their brilliance resonating in every innovation and breakthrough.&lt;/span&gt; &lt;span data-ccp-parastyle="x_elementtoproof" style=""&gt;It’s&lt;/span&gt; &lt;span data-ccp-parastyle="x_elementtoproof" style=""&gt;time to make tech an inclusive space.&lt;/span&gt; &lt;span data-ccp-parastyle="x_elementtoproof" style=""&gt;It's&lt;/span&gt; &lt;span data-ccp-parastyle="x_elementtoproof" style=""&gt;time to harness the full potential of diverse talent and build a future where women are equally represented and celebrated in the world of technology, where their unique contributions produce of story of empowerment and achievement. &lt;/span&gt;&lt;/font&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13321511</link>
      <guid>https://www.technologyfirst.org/Tech-News/13321511</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Tue, 27 Feb 2024 17:59:28 GMT</pubDate>
      <title>From Imposter Syndrome to Empowerment: A Woman's Story of Growth in IT</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Newsletter/Ashima%20Sharma%20blog.png" alt="" title="" border="0"&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 15px;"&gt;In the dynamic world of technology, authenticity is not just a choice; it's a superpower that propels women forward in their journey through challenges and opportunities alike. As a woman in IT, I've found that embracing authenticity has been the key to navigating the twists and turns of my career with unwavering determination and a commitment to staying true to myself. In this blog, I invite you to join me on a transformative journey of self-discovery, resilience, and empowerment in the ever-evolving field of IT.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{}"&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 15px;"&gt;Authenticity is the key to success for women in IT. By embracing our true selves, we unlock our full potential, inspire others, and drive meaningful change in the industry.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{}"&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 15px;"&gt;Amidst the challenges of my journey in IT, one of the most profound experiences was my transition from India to the US. Moving to a new country brought with it a host of challenges, including language barriers and the longing for family back home. These challenges quickly led to negative self-talk and resulted in me diminishing my own skills that I had acquired and learning that I’d received till that point.&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{}"&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 15px;"&gt;Despite these obstacles, I embraced the opportunity with courage and determination, seeking out entry-level positions in IT while simultaneously mastering US English. Through perseverance and resilience, I overcame these challenges, created a version of myself that was able to start over, while building on strengths I already had and achieving my goals regardless of what challenges I had to surmount. This proved to me and others that authenticity knows no boundaries and that embracing our true selves is the ultimate path to empowerment.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{}"&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" color="#9B470D"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 19px;"&gt;Overcoming Imposter Syndrome: Embracing Opportunity and Change&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{}"&gt;&lt;font style="font-size: 19px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 15px;"&gt;"Always be a first-rate version of yourself, instead of a second-rate version of somebody else." - Judy Garland&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{}"&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 15px;"&gt;I have held roles of Software Developer, Business Analyst, Technical Writer, Project Manager, Program Leader, IT Dev Team Manager, Agile Transformation Leader and PMO Director in various organizations in FinTech, Healthcare and Marketing industries. All this while organically growing by learning each skill at the most foundational level, by doing it myself.&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{}"&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 15px;"&gt;As women in IT, we often face imposter syndrome, doubting our abilities and downplaying our achievements. But success comes from embracing opportunities and challenges, believing in us, and taking bold steps forward. Even if that means asking for the compensation we deserve, a promotion we have been eyeing, or applying for an opportunity we may have already talked ourselves out of, in our mind.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{}"&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 15px;"&gt;Along the way I found many mentors who I ingratiate myself to this day! For those reading this you know who you are, and I thank you from the bottom of my heart!&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{}"&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 19px;" color="#9B470D"&gt;Continuous Learning, Mentoring, and Modern-Day Skills:&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{}"&gt;&lt;font style="font-size: 19px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 15px;"&gt;We find this world of IT constantly evolving and changing with rapid technical advancements. When we stop learning, we stop growing. In addition to the skills these roles have required, I have recently delved into the realms of Generative AI and Cloud Infrastructure Strategy. Continuously learning and adapting to modern-day technologies is essential in staying relevant and effective in the rapidly evolving field of IT. These skills have not only expanded my expertise but have also enabled me to contribute meaningfully to innovative projects and initiatives.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{}"&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 15px;"&gt;Along my journey in IT, I always look forward to giving back. I've had the privilege of mentoring four talented women in IT, guiding them on their paths while learning valuable lessons from their unique perspectives and experiences. This journey of mentorship has reinforced the importance of giving back and helping others achieve their goals. By lifting each other up and fostering a culture of support and collaboration, we can create a more inclusive and empowering environment for women in the tech industry.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{}"&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" color="#9B470D"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 19px;"&gt;A Leap of Faith: Balancing Education, Parenthood, and Career Ambitions&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{}"&gt;&lt;font style="font-size: 19px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 15px;"&gt;"The only limit to the height of your achievements is the reach of your dreams and your willingness to work for them." - Michelle Obama&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{}"&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 15px;"&gt;As a mother and a woman in IT, I faced a pivotal moment in my career journey when I decided to pursue higher education while juggling the demands of motherhood and a full-time job. With my first baby just 13 months old, I embarked on the challenging yet rewarding journey of earning an MBA. Balancing late-night study sessions with diaper changes and boardroom meetings, I learned the true meaning of resilience and determination. Despite the obstacles in my path, I refused to let anything hold me back from achieving my goals. Along the way I did turn some naysayers into believers and friends by achieving precisely what I was told ‘I can’t do’!&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{}"&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" color="#9D470D"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 19px;"&gt;Practical Tips for Embracing Authenticity:&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{}"&gt;&lt;font style="font-size: 19px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 15px;"&gt;1.&lt;/font&gt;&lt;/span&gt; &lt;span data-contrast="auto"&gt;&lt;em&gt;&lt;font style="font-size: 15px;"&gt;Stay True to Your Values:&lt;/font&gt;&lt;/em&gt;&lt;/span&gt; &lt;span data-contrast="auto"&gt;&lt;font style="font-size: 15px;"&gt;In a fast-paced industry like IT, it's easy to get swept up in trends and expectations. Stay grounded by reminding yourself of your core values and beliefs, and let them guide your decisions and actions.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{}"&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 15px;"&gt;2.&lt;/font&gt;&lt;/span&gt; &lt;span data-contrast="auto"&gt;&lt;em&gt;&lt;font style="font-size: 15px;"&gt;Embrace Vulnerability:&lt;/font&gt;&lt;/em&gt;&lt;/span&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 15px;"&gt;Don't be afraid to show your vulnerabilities and imperfections. It's okay to ask for help, admit when you don't have all the answers, and share your struggles with others. Vulnerability fosters connection and empathy, making you more relatable and approachable.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{}"&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 15px;"&gt;3.&lt;/font&gt;&lt;/span&gt; &lt;span data-contrast="auto"&gt;&lt;em&gt;&lt;font style="font-size: 15px;"&gt;Seek Mentorship and Support:&lt;/font&gt;&lt;/em&gt;&lt;/span&gt; &lt;span data-contrast="auto"&gt;&lt;font style="font-size: 15px;"&gt;Surround yourself with mentors, colleagues, and friends who uplift and support you on your journey. Seek out opportunities for mentorship and peer support, and don't hesitate to reach out for guidance when you need it.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{}"&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 15px;"&gt;4.&lt;/font&gt;&lt;/span&gt; &lt;span data-contrast="auto"&gt;&lt;em&gt;&lt;font style="font-size: 15px;"&gt;Celebrate Your Achievements:&lt;/font&gt;&lt;/em&gt;&lt;/span&gt; &lt;span data-contrast="auto"&gt;&lt;font style="font-size: 15px;"&gt;Take time to celebrate your successes, no matter how small they may seem. Recognize your achievements, acknowledge your progress, and give yourself credit for your hard work and perseverance.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{}"&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" color="#9D470B"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 19px;"&gt;Seizing the Moment: Leading with Purpose and Passion&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{}"&gt;&lt;font style="font-size: 19px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 15px;"&gt;"Success is not about the destination but the journey of embracing opportunities and challenges along the way." - Angela Duckworth&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{}"&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 15px;"&gt;Authenticity empowers us to lead with purpose and passion, embracing vulnerability and transparency in our interactions with others. By sharing our stories of growth and transformation, we inspire our colleagues and peers to embrace their authenticity, unleash their potential, and pursue their dreams with unwavering conviction. Bringing our whole self to work, being open and honest and leading with purpose and values has continuously proven to be the recipe for success in my career.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{}"&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" color="#9D470B"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 19px;"&gt;Conclusion:&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{}"&gt;&lt;font style="font-size: 19px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 15px;"&gt;As I reflect on my journey of growth and empowerment in IT, I'm reminded of the incredible potential that lies within each of us. By embracing authenticity, seizing opportunities, and staying true to ourselves, we can overcome any obstacle and achieve our wildest dreams. Together, let's rewrite the narrative of women in IT, one story at a time.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{}"&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" style="font-size: 14px;"&gt;&lt;em&gt;Ashima Sharma works is Senior Director IT at CareSource. Her expertise is in the field of PMO leadership, digital transformation, Agile development business analysis and change management. Ashima has over 20 years of leadership and strategy experience in the IT industry.&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13321499</link>
      <guid>https://www.technologyfirst.org/Tech-News/13321499</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Tue, 30 Jan 2024 15:45:22 GMT</pubDate>
      <title>The Unparalleled Value of In-Person Conferences</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/Jill%20Campbell.svg" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" color="#009AC6"&gt;&lt;span data-contrast="auto"&gt;&lt;strong&gt;&lt;font style="font-size: 15px;"&gt;Why attend conferences?&lt;/font&gt;&lt;/strong&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 15px;"&gt;In our current state of virtual interactions, overwhelmed by Zoom meetings and conference calls, the allure of in-person conferences may seem diminished. The hesitations around handshakes, proximity, and shared spaces are understandable, especially considering the prevailing concerns about health and hygiene. However, it's crucial to reevaluate the significance of attending conferences and consider making them a priority, period.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;span data-contrast="auto"&gt;&lt;strong&gt;&lt;font color="#009AC6" style="font-size: 15px;"&gt;Networking Extravaganza&lt;/font&gt;&lt;/strong&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 15px;"&gt;One of the most apparent benefits of attending conferences is the unparalleled opportunity to network with individuals you might not encounter otherwise. Conferences serve as a melting pot of leaders in specific fields, subject matter experts, and peers facing similar challenges or operating within comparable environments. The importance lies in the exposure to diverse experiences within our own fields, offering fresh perspectives on problems that may have seemed insurmountable. This exposure broadens our horizons, enabling us to learn new approaches and ideas that we might never have encountered in our routine professional circles.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 15px;"&gt;The chance encounters, often referred to as "drive-byes," present themselves in the hallways, between sessions, and even during meal breaks. Some of my most enriching conversations and discussions on various topics have unfolded spontaneously during these breaks and lunches at conferences. These unplanned interactions have provided invaluable opportunities to broaden my network. Remarkably, the connections made in such informal settings have proven to be exceptionally beneficial over the years, even in situations where I hadn't anticipated needing that resource. These connections have evolved into some of my most trusted professional relationships, with whom I remain closely connected to this day.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;span data-contrast="auto"&gt;&lt;strong&gt;&lt;font style="font-size: 15px;"&gt;&lt;font color="#009AC6"&gt;M&lt;/font&gt;&lt;font color="#009AC6"&gt;eeting Influential Leaders and Your Heroes&lt;/font&gt;&lt;/font&gt;&lt;/strong&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 15px;"&gt;Conferences offer a unique opportunity to rub shoulders with influential leaders, industry titans, and even your professional heroes. Whether it's participating in a panel discussion, attending keynote addresses, or simply engaging in networking sessions, the chance encounters with individuals who have shaped your industry can be transformative and inspiring. The individuals you encounter at conferences are often considered experts and influencers within the conference's subject matter, and sometimes, even beyond. Reflecting on an experience at the BoxWorks conference, I found myself in the front row listening to Neil deGrasse Tyson. The impact of his wisdom, shared amidst the excitement of the crowd, resonated with me on a personal level. This profound experience would not have been as impactful had I not been physically present, feeling the collective energy in the room. Simultaneously, during the Women in IT sessions, I had the privilege of hearing Jill Biden speak. Her insights, especially on navigating personal challenges, deeply affected me. Engaging with her one-on-one after the session was an opportunity, I might have missed had I not attended the conference.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;span data-contrast="auto"&gt;&lt;strong&gt;&lt;font color="#009AC6" style="font-size: 15px;"&gt;Continuous Professional Development&lt;/font&gt;&lt;/strong&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 15px;"&gt;Conferences are veritable gold mines of knowledge, providing a unique platform to expand your expertise, learn from industry experts, and improve your skill set. Workshops, presentations, and interactive sessions offer hands-on experiences that go beyond the theoretical realm, fostering a continuous learning environment that can significantly contribute to your professional growth. The smaller group settings can allow for more interpersonal conversation and provide more opportunities for questions to be heard and discussions to be more conclusive. More than once, I have learned a different approach, a new application, or even a new technology I was not aware of that solves a problem my organization had been facing. Attending a conference allowed me to have an impromptu conversation with a vendor, another attendee, or a technology expert that I would not have even known to have sought out.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;span data-contrast="auto"&gt;&lt;strong&gt;&lt;font color="#009AC6" style="font-size: 15px;"&gt;Insights into the Latest Trends&lt;/font&gt;&lt;/strong&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 15px;"&gt;Staying ahead of the curve is essential in any industry, and conferences are the hotspots for unveiling the latest trends, innovations, and technological advancements. Engaging with thought leaders and industry pioneers provides a front-row seat to the future landscape of your field. These events serve as dynamic forums where groundbreaking ideas are discussed, emerging technologies are showcased, and visionary strategies are unveiled.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 15px;"&gt;Conferences offer a unique opportunity to gain a deep understanding of the current market dynamics and where it's headed. Attendees often have the privilege of participating in discussions and sessions that delve into cutting-edge concepts, disruptive technologies, and transformative industry shifts. Keynote speakers, who are often influential figures with their finger on the industry's pulse, share invaluable insights into the direction of the market, helping attendees anticipate changes and adapt their strategies accordingly.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 15px;"&gt;Moreover, these gatherings facilitate direct interactions with industry experts and innovators who are driving the latest trends. Networking sessions, panel discussions, and collaborative workshops create an environment where professionals can engage in meaningful conversations about the challenges and opportunities posed by emerging trends. These interactions not only provide theoretical knowledge but also offer practical insights on how to implement and leverage these trends in your specific professional context.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 15px;"&gt;Conferences act as accelerators for staying informed about the newest methodologies, tools, and best practices that are reshaping the industry landscape. Whether it's the integration of artificial intelligence, the evolution of sustainable practices, or the latest advancements in digital transformation, conferences offer a comprehensive and firsthand view of the trends that will define the future of your profession.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" color="#009AC6"&gt;&lt;span data-contrast="auto"&gt;&lt;strong&gt;&lt;font style="font-size: 15px;"&gt;Enhancing Your Professional Profile&lt;/font&gt;&lt;/strong&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 15px;"&gt;Attending conferences isn't just about accumulating knowledge; it's about showcasing your commitment to professional development. Including conference participation on your resume demonstrates your proactive approach to staying informed, engaged, and connected within your industry. It signals to potential employers that you are dedicated to continuous improvement and staying abreast of the latest industry trends.&amp;nbsp; It may also lead to topical conversation within an interview conversation that sets you apart from other candidates!&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;span data-contrast="auto"&gt;&lt;font style="font-size: 15px;"&gt;By immersing yourself in the immense opportunity of insights presented at conferences, you not only gain a competitive edge but also position yourself as a forward-thinking professional. These events empower you to become a trendsetter within your organization, bringing back actionable knowledge that can shape strategies, influence decision-making, and contribute to the success of your team or business. In essence, attending conferences becomes a strategic investment in your professional acumen, ensuring that you are not just keeping up with the latest trends but actively shaping and leading the way forward.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 12px;"&gt;&lt;span style="background-color: rgb(255, 255, 255);"&gt;&lt;font&gt;Jill Campbell is a seasoned IT leader known for her successful track record in crafting clear and compelling IT and Digital strategies. She is an expert in developing detailed transformation IT roadmaps, aligning IT organizational models, and optimizing business systems. She has excelled in leadership roles within both commercial and defense sectors and currently enjoys consulting in both higher education and non-profits.&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13307867</link>
      <guid>https://www.technologyfirst.org/Tech-News/13307867</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Tue, 30 Jan 2024 14:46:33 GMT</pubDate>
      <title>The Transformation of Cyber Insurance</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/Seth%20Marsh.svg" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;Navigating the ever-evolving landscape of cyber insurance is something that we cannot rest on. As the year begins, most of us are looking into what this year holds. As we know, the rapidly changing landscape of IT is evolving and will always be presenting a myriad of challenges and opportunities. Among these, one significant change that is poised to shape the future is the transformation of cyber insurance. We will touch on the changing dynamics of cyber insurance and how the effects of these changes will impact organizations of all sizes.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;As we are gearing up for this new year and moving 2023 to our rear-view mirror, some interesting things are occurring in all facets of IT. One factor that will become more and more prevalent in 2024 and beyond is what Cyber Insurance will cover and what will be changing in this space. One of the cornerstones of the insurance world, Lloyds of London announced in 2023 that they have a significant exclusion. They will refuse to cover “nation state attacks” and this move has caused a ripple effect that is impacting organizations seeking cyber insurance. Additionally, we have even seen certain clients denied cyber insurance which raises concerns about the sustainability of the cyber insurance landscape.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;As we gaze into the future, it is becoming increasing evident that cyber insurance will fall into one of these distinct buckets:&lt;/font&gt;&lt;/p&gt;

&lt;ol&gt;
  &lt;li&gt;&lt;font face="Verdana" style="font-size: 15px;" color="#009AC6"&gt;&lt;span style=""&gt;&lt;em&gt;Pricey Proposition- Premiums will soar past what they are currently with the number of cyber threats growing, the complexity of the threats, and ransoms increasing. Cyber Insurance companies are facing the risks and are likely to place the burden onto those getting insured, making this a costly investment.&lt;/em&gt;&lt;/span&gt;&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 15px;" color="#009AC6"&gt;&lt;em&gt;Denial Dilemma- With the scope of coverage shrinking, organizations may face getting denied cyber insurance as criteria for approval will become more stringent.&lt;/em&gt;&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 15px;" color="#009AC6"&gt;&lt;em&gt;Condensed Coverage- With cyber insurance coverage being reduced and some attacks not being covered from the get-go, some organizations will wonder what is point of being insured at all.&lt;/em&gt;&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 15px;" color="#009AC6"&gt;&lt;em&gt;Independently Self- Insured- Facing expensive premiums, denials, condensed coverage, some organizations will consider self-insuring and taking on the risks of what those entails.&lt;/em&gt;&lt;/font&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;A recent cyber insurance policy, seen below, that took effect on January 1&lt;sup&gt;st,&lt;/sup&gt; 2024, shows exactly what organizations are up against when looking into cyber insurance.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/Seths%20blog%20image.png" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;If we are being honest what DOESN’T constitute “cyber warfare”? As the lines of cyber warfare are blurred, cyber insurance organizations will have to narrow down what they will and will not cover. As cyber insurance companies grapple with these nuances, organizations are left navigating a complex landscape where the terms and conditions are constantly under review. &amp;nbsp;This will greatly impact both costs to the end-user, and at some point, users will have to decide IF they will choose to continue insurance coverage or not.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;In conclusion, the shifting of cyber insurance in 2024 demands that organizations are informed of the changes and proactively looking at what the cyber insurance companies are doing. The trends indicate that higher costs, increased denials, and reduced coverage are coming. Navigating this requires a deep understanding of the evolving landscape, a commitment to robust cybersecurity practices, and a readiness to adapt to the changing norms within the insurance industry.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;As we start the new year, organizations must critically evaluate their cyber insurance needs, reassess their risk tolerance, and chart a course that aligns with the evolving realities of the digital age. The journey ahead is complex, but with informed decision-making and a resilient cybersecurity strategy, organizations can navigate the challenges and uncertainties that lie on the horizon.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 12px;"&gt;Seth Marsh is a security specialist with over 30 years of experience in the IT industry. Before leading Sales &amp;amp; Marketing at TMG, Seth led sales for a global full-service security provider and served as a VAR rep focusing on security during his last 12+ years specifically while working with Cisco. This breadth of experience allows him to understand clients’ needs and the ins and outs of the supplier and distribution side.&lt;/font&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13307841</link>
      <guid>https://www.technologyfirst.org/Tech-News/13307841</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Wed, 20 Dec 2023 19:27:14 GMT</pubDate>
      <title>Managing Cyberthreats in 2024</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/Jordan%20Silva.svg" alt="" title="" border="0"&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li style="list-style: none; display: inline"&gt;
    &lt;p&gt;&lt;font face="Verdana"&gt;&lt;font style="font-size: 15px;"&gt;Whether an individual, a small business, or an enterprise – cybercrime doesn’t discriminate. All things “cyber” continue to grow, unfortunately including cybercrime (cyberattacks, cyberthreats, hacking, phishing, etc.). Follow along to learn what cyber challenges we are anticipating in 2024 and how you can manage.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;p&gt;&lt;font face="Verdana"&gt;&lt;font style="font-size: 15px;"&gt;&lt;strong&gt;&lt;font color="#009AC6"&gt;Growth in Cybercrime&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;p&gt;&lt;font face="Verdana"&gt;&lt;font style="font-size: 15px;"&gt;Cybercrime has been on a steep rise over the past several years. With ransomware and “data extortion” breaches making the news almost daily, attackers have turned these activities into profitable revenue streams that are unlikely to stop soon. While risks are at an all-time high, the task of protecting networks is becoming harder for businesses of all sizes. As we migrate to de-centralized cloud-based applications, the traditional “castle” method of defense with building walls around our most valued assets will no longer work.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;p&gt;&lt;font face="Verdana"&gt;&lt;font style="font-size: 15px;"&gt;The number of applications used by a typical organization has rapidly grown in the last few years. According to recent reports, organizations use 130 SaaS apps, which is up from just 16 five years ago. The problem is then compounded by bringing more and more of our devices online, which creates additional “attack vectors” for cybercriminal to target within our environments. Forecasts say there will be 41.6 billion IoT (Internet of Things) * devices by 2025. These include POS and entertainment systems, cell phones and computers, digital signage, printers and more. Not to mention, the software and firmware running these systems sit atop increasingly complex codebases.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;p&gt;&lt;font face="Verdana"&gt;&lt;font style="font-size: 15px;"&gt;&lt;strong&gt;&lt;font color="#009AC6"&gt;So, what can you do?&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;p&gt;&lt;font face="Verdana"&gt;&lt;font style="font-size: 15px;"&gt;Business size plays little part in who is or is not attacked. As the “business of cybercrime” has grown, there are now attackers that fit victims of every size. Unfortunately, there is no one-size-fits-all solution for this complicated problem.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;p&gt;&lt;font face="Verdana"&gt;&lt;font style="font-size: 15px;"&gt;Individuals and small businesses have limited financial resources dedicated to cybersecurity, making it crucial to prioritize and allocate resources effectively. As businesses grow and become more valuable, it is critical that they continue to increase their security posture at the same rate to address new risks and prevent increasing potential losses.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;p&gt;&lt;font face="Verdana"&gt;&lt;font style="font-size: 15px;"&gt;The Federal Trade Commission lists five principles of sound data security:&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;font face="Verdana"&gt;1.&lt;font style="font-size: 9px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; &lt;font style="font-size: 15px;"&gt;&lt;strong&gt;&lt;font&gt;Take stock:&lt;/font&gt;&lt;/strong&gt; &lt;font&gt;Inventory the office and know what information you have – where is it stored and who has access? What do those people or businesses do with the information they have access to?&lt;/font&gt;&lt;br&gt;&lt;/font&gt;&lt;/font&gt;&lt;font face="Verdana"&gt;&lt;font style="font-size: 15px;"&gt;2.&lt;font&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; &lt;strong&gt;&lt;font&gt;Scale down:&lt;/font&gt;&lt;/strong&gt; &lt;font&gt;Retain only what you need. The more information you hold the greater the risk that personal information will get exposed.&lt;br&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;font face="Verdana"&gt;&lt;font style="font-size: 15px;"&gt;3.&lt;font&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; &lt;strong&gt;&lt;font&gt;Lock it:&lt;/font&gt;&lt;/strong&gt; &lt;font&gt;Providing the minimal amount of access needed to people and devices generally leads to better overall security. On your network, two things you can do are:&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;
&lt;/blockquote&gt;

&lt;blockquote&gt;
  &lt;blockquote&gt;
    &lt;font style="font-size: 15px;"&gt;&lt;font face="Verdana"&gt;&lt;strong&gt;&lt;font&gt;a.&lt;font&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/font&gt;&lt;/strong&gt; &lt;font&gt;Using advanced firewall with security features like intrusion detection, content filtering and built-in malware scanning. This will help prevent customers and your team from mistakenly navigating to malicious websites and help stop already malicious devices from connecting back to their servers.&lt;br&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;
  &lt;/blockquote&gt;

  &lt;blockquote&gt;
    &lt;font style="font-size: 15px;"&gt;&lt;font face="Verdana"&gt;&lt;strong&gt;&lt;font&gt;b.&lt;font&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/font&gt;&lt;/strong&gt; &lt;font&gt;Segment your network to reduce the impact if there is a breach. Create smaller “Virtual Networks” (VLANs) in your environment to virtually split up which devices can communicate with each other. A common setup for small to midsize businesses might be to build four “virtual networks” like…&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;
  &lt;/blockquote&gt;
&lt;/blockquote&gt;

&lt;div style="margin-left: 6em"&gt;
  &lt;ul&gt;
    &lt;li&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;Network for devices that fall under compliance, like your POS systems.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;Network for normal business devices, like a desktop computer or a laptop.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;Network for your customers.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;Network for all your IoT devices that don’t fall into one of the other categories.&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;blockquote&gt;
  &lt;font face="Verdana"&gt;&lt;font style="font-size: 15px;"&gt;4.&lt;font&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; &lt;strong&gt;&lt;font&gt;Pitch it:&lt;/font&gt;&lt;/strong&gt; &lt;font&gt;If you don’t need it, get rid of it securely. Create a retention schedule and have appropriate disposal processes and devices.&lt;br&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;font face="Verdana"&gt;&lt;font style="font-size: 15px;"&gt;5.&lt;font&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; &lt;strong&gt;&lt;font&gt;Plan ahead:&lt;/font&gt;&lt;/strong&gt; &lt;font&gt;Create a policy and procedure regarding cybersecurity and invest in the correct technologies and partners if it’s not your expertise. Use reputable vendors for purchasing hardware and services, and stick with trusted brands – especially when it comes to internet connected devices. Many IoT devices found online are made by fly-by-night manufacturers and have been found to come with “backdoors” built in, but even those not compromised from the start are often not supported long term by the makers and become security risks.&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
  &lt;li style="list-style: none; display: inline"&gt;
    &lt;p&gt;&lt;font face="Verdana"&gt;&lt;font style="font-size: 15px;"&gt;And finally, never neglect your people. Even a perfect fence can’t work if someone accidentally leaves the gate open. So, invest in employee training and security awareness.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;p&gt;&lt;font face="Verdana"&gt;&lt;font style="font-size: 15px;"&gt;A few key practices to highlight: **&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li style="list-style: none; display: inline"&gt;
    &lt;ul&gt;
      &lt;li&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;Secure personal devices like laptops and phones, especially when in public places. Be sure to lock your screen if your computer is unattended, and don’t install software that isn’t authorized on work devices.&lt;/font&gt;&lt;/li&gt;

      &lt;li&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;Educate employees on the signs of a cyberattack, especially phishing, and the laws that apply to data they may handle.&lt;/font&gt;&lt;/li&gt;

      &lt;li&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;Make sure employees know who to turn to and feel they can come to you if an issue arises, it takes the whole team to fight these threats.&lt;/font&gt;&lt;/li&gt;

      &lt;li&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;Remove employee access if they are no longer with the company even if you don’t think the person is a risk. User accounts no one is using leaves the door cracked open for attackers.&lt;/font&gt;&lt;/li&gt;
    &lt;/ul&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;As we approach 2024, individuals and businesses must be prepared to tackle the evolving cyberthreat landscape. Understanding the seriousness of cybersecurity, identifying your unique needs, and addressing the practices above are great ways to start.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;&lt;em&gt;&lt;font style="font-size: 13px;"&gt;*Stats found in Harvard Business Review:&lt;/font&gt;&lt;/em&gt; &lt;a href="https://hbr.org/2023/04/cyber-risk-is-growing-heres-how-companies-can-keep-up" target="_blank"&gt;&lt;font&gt;&lt;em&gt;&lt;font style="font-size: 13px;"&gt;https://hbr.org/2023/04/cyber-risk-is-growing-heres-how-companies-can-keep-up&lt;/font&gt;&lt;/em&gt;&lt;/font&gt;&lt;/a&gt; &lt;em&gt;&lt;font style="font-size: 13px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 15px;"&gt;&lt;em&gt;&lt;font face="Verdana" style="font-size: 13px;"&gt;**Principles and practices found from Protecting the Unprotected: Data Breach Prevention and Response – A Guide for Businesses and Charities by Dave Yost&lt;/font&gt;&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#4D5758" face="Verdana" style="font-size: 12px;"&gt;&lt;em&gt;Jordan is a Senior Manager of Security and Cloud Services at Hawaiian Telcom, a company under altafiber’s family of companies. He has spent nearly two decades helping organizations implement technology to solve business challenges. Jordan has a Master of Science in Leadership and Management and has earned CSSP, C|CISO, and GCFA certifications. He will happily talk your ear off regarding anything with technology, organizational culture, or the best ways to cook meat with fire!&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13293152</link>
      <guid>https://www.technologyfirst.org/Tech-News/13293152</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Wed, 20 Dec 2023 19:11:09 GMT</pubDate>
      <title>IT Staffing: Are You a Victim or Leader?</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/Paul%20Stafford.svg" alt="" title="" border="0"&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 15px;" color="#009AC6"&gt;&lt;strong style=""&gt;The Crisis We Are In&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;The pandemic changed a lot!!&amp;nbsp;&amp;nbsp; Trust and confidence in IT have increased as a result of the support the organization received from IT when the pandemic was at the most volatile stage. Expectations for IT are also higher now as a result.&amp;nbsp; While worker productivity was proven to reach, or even surpass, pre-pandemic levels for IT performance, attitudes and expectations of IT staff have also shifted as a result.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;The "great resignation" emerged - and continues to some extent.&amp;nbsp; IT staffing functions (both recruiting and retention) are in a state of "crisis" - whether it involves bringing talent in through the front door or preventing them from wanting to leave.&amp;nbsp; While many organizations have adjusted as a result of living through the pandemic, many more have not - with some that are even still waiting for the "right time" to move back to old practices.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;The staffing crisis is acute enough to put business goals and objectives at serious risk.&amp;nbsp; While seemingly not a glamorous technology "trending" topic, it continues to rank as one of the highest areas of impact to IT organizations as we move into 2024 - certainly one of the top three across the majority of the 30+ CIO clients I work with and advise.&amp;nbsp; Many CIOs are battling against antiquated HR-related policy and an organizational culture that works to their disadvantage.&amp;nbsp; My repeated advice to my clients is not to get caught in the "victim" mentality - but to do more to lead the changes that might be necessary.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 15px;" color="#009AC6"&gt;&lt;strong&gt;Staffing (recruiting and retention) as a Core Competence&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;Staffing is a multi-dimensional function - encompassing attracting, hiring, and retaining resources.&amp;nbsp; Too many IT leaders are focused almost exclusively on the hiring function and ignore what it takes to attract and to retain the talent they need.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;At the same time, workers’ expectations have shifted - whether as a part of living through the pandemic or as a function of the shifting norms and nuances of different generations - work-life balance is higher on the list of important considerations than ever.&amp;nbsp; The CIO needs to have a strong partner in the CHRO (and support from above) to tackle some of the foundational elements that can positively impact the CIO's staffing functions.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;IT leaders also need to better understand what factors influence the Employee Value Proposition (EVP) of the candidates and employees who are making decisions every day whether to join, stay, or leave.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 15px;" color="#009AC6"&gt;&lt;strong&gt;Sourcing IT Candidates&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;Traditional recruiting channels do not continue to deliver as in the past while direct recruiting of experienced workers is more competitive than ever before.&amp;nbsp; College Internships as a way of "sourcing" inexperienced candidates continues to change - with candidates entering internship programs earlier in their college years and receiving offers from potential employers much earlier than before.&amp;nbsp; It's not unusual to see internships attracting sophomores and freshmen while organizations try to lock in earlier on students with potential.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;As a result, non-traditional sourcing channels are gaining attention and interest.&amp;nbsp; IT Apprenticeship programs have been growing in popularity - targeting "2nd career" candidates in their 30's and 40's as a way of introducing them to more entry-level IT functions such as help desk, deskside support, security monitoring, testing, and even early data analytics.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;Also, focusing more broadly across all employee demographic categories is important.&amp;nbsp;&amp;nbsp; More formalized Women in IT programs with specific attention is needed to address the unique needs and interests of women as that demographic continues to see less candidates entering college IT curriculums.&amp;nbsp; Also, DEI programs are getting more attention to address areas of interest that will help in attracting and retaining talent.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 15px;" color="#009AC6"&gt;&lt;strong&gt;Retention&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;The economics and benefits of focusing more on retention efforts are clear.&amp;nbsp; It is easier, less expensive, and less risky to retain a skilled employee who is performing well than to find a new one.&amp;nbsp; Especially given that much of the job-at-hand is unique to the organization regardless of the core functions that underly the position (and are considered "transferable" skills).&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;Understanding what factors drive retention is often a gap for many managers.&amp;nbsp; Putting too much emphasis on compensation is a common problem.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;Likewise, assuming that certain retention factors are the same across all workers is another problem.&amp;nbsp; While trends may seem to emerge across certain demographic dimensions (age, gender, nationality, etc.) knowing your employees well is the best way to know what factors are important to each one.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;Some popular targets in the area of staff retention include developing programs and adjusting policy to:&lt;/font&gt;&lt;/p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;&lt;font&gt;o&lt;font&gt;&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/font&gt; Allow for flexible work arrangements (location as well as time of day) based on the position&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

  &lt;p&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;&lt;font&gt;o&lt;font&gt;&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/font&gt; Accelerate opportunities and timelines for career advancement&lt;/font&gt;&lt;/p&gt;

  &lt;p&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;&lt;font&gt;o&lt;font&gt;&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/font&gt; Expose employees to other technical (or functional) areas of interest that they aren't currently exposed to - and provide more opportunities for education that can be leveraged&lt;/font&gt;&lt;/p&gt;

  &lt;p&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;&lt;font&gt;o&lt;font&gt;&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/font&gt; Strengthen performance measurement programs in order to more accurately reward high performers, improve marginal performers, and remove non-performers&lt;/font&gt;&lt;/p&gt;

  &lt;p&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;&lt;font&gt;o&lt;font&gt;&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/font&gt; Reskill employees and business technologists to fill gaps created by the shift from legacy technologies to emerging ones&lt;/font&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 15px;" color="#009AC6"&gt;&lt;strong&gt;Bottom Line&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;The organization relies on the ability of the IT function, more than any other, to achieve its bottom line and to accomplish its goals and objectives - whether it's strategically transforming itself or operating in a business-as-usual mode of operations.&amp;nbsp;&amp;nbsp; IT leaders need to continually articulate the direct correlation between their ability to perform and "deliver" - and the business outcomes that their IT services are expected to enable or influence.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;It should be a pretty straightforward value proposition when it comes to getting the attention (and at times the additional investment) needed to address the necessary changes or enhancement.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;As IT leaders we need to take greater interest, control, and influence over something that is so impactful and influential to our success - and ultimately the success of the organization.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 12px;"&gt;&lt;em&gt;Paul Stoddard is an Executive Partner with Gartner’s Executive Programs. He works to provide expertise and guidance to his CIO clients as a trusted advisor to help them realize their strategic goals and achieve their business objectives. Paul brings 35+ years of a very broad IT background as both a technology consultant and former CIO at several large-scale firms.&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13293139</link>
      <guid>https://www.technologyfirst.org/Tech-News/13293139</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Wed, 29 Nov 2023 12:41:28 GMT</pubDate>
      <title>Technology First Was the Place to Be in 2023!</title>
      <description>&lt;p&gt;&lt;font color="#000000" face="Calibri, sans-serif" style="font-size: 15px;"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/YIR%202023.png" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p align="center"&gt;&lt;font face="Arial, Helvetica, sans-serif" color="#01507A" style="font-size: 15px;"&gt;&lt;strong style=""&gt;Technology First Was the Place to Be in 2023!&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Arial, Helvetica, sans-serif" style="font-size: 15px;"&gt;As the year draws to a close, let’s reflect on how our members lived up to Technology First’s mission to connect, strengthen, and champion the best-connected technology community in the Dayton region.&lt;/font&gt;&lt;/p&gt;

&lt;table width="99%" cellpadding="0" cellspacing="0" watable="1" class="contStyleExcSimpleTable" style="border-collapse: collapse; border-style: solid; border-width: 1px; border-color: rgb(242, 242, 242);" align="center"&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td style="border-style: solid; border-width: 1px; border-color: rgb(242, 242, 242);" valign="top" align="center"&gt;
        &lt;p align="center"&gt;&lt;strong style="font-size: 15px; color: rgb(1, 80, 122); font-family: Arial, Helvetica, sans-serif;"&gt;January&lt;/strong&gt;&lt;span style=""&gt;&amp;nbsp;&lt;/span&gt;&lt;br&gt;&lt;/p&gt;

        &lt;p align="center"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/YIR%202023/2%20CIO%20Panel%20January.jpeg" alt="" title="" border="0" width="530" height="343"&gt;&lt;/p&gt;

        &lt;p&gt;&lt;font style="font-family: Arial, Helvetica, sans-serif; font-size: 15px;"&gt;Our Peer Resource Groups began the year strong with our Annual CIO Forecast Panel. Board Chair Treg Gilstorf, the Chief Operating Officer for Smart Data and CNBS Software moderated a discussion with J.D. Whitlock, the Chief Operating Officer for Dayton Children’s Hospital, Jon Scruggs, Director of IT for Hobart Service, and Matt Coatney, Chief Information Officer for Thompson Hine LLP.&amp;nbsp;&lt;/font&gt;&lt;a href="https://www.technologyfirst.org/Events"&gt;&lt;font style="font-size: 15px;"&gt;Here&lt;/font&gt;&lt;/a&gt;&lt;font style="font-family: Arial, Helvetica, sans-serif; font-size: 15px;"&gt;&amp;nbsp;is how you can get involved in a Peer Resource Group in 2024.&lt;/font&gt;&lt;/p&gt;
      &lt;/td&gt;
    &lt;/tr&gt;

    &lt;tr&gt;
      &lt;td style="border-style: solid; border-width: 1px; border-color: rgb(242, 242, 242);" valign="top"&gt;
        &lt;p align="center"&gt;&lt;strong&gt;&lt;font color="#01507A" face="Arial, Helvetica, sans-serif" style="font-size: 15px;"&gt;February&lt;/font&gt;&lt;/strong&gt;&lt;br&gt;&lt;/p&gt;

        &lt;p align="center"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/YIR%202023/Digital%20Mixer%20February.jpeg" alt="" title="" border="0" width="530" height="359"&gt;&lt;/p&gt;

        &lt;p align="center"&gt;&lt;font face="Arial, Helvetica, sans-serif" style="font-size: 15px;"&gt;Our Digital Mixer was a big hit! We brought education and industry together to meet workforce needs. Many thanks to Partner Wright State University for hosting. Technology First Executive Director, Melissa Cutcher, was a guest on the podcast &lt;em style=""&gt;A Greater Dayton&lt;/em&gt; and shared why events like the Digital Mixer make Technology First such a relevant trade association. &lt;a href="https://www.technologyfirst.org/event-5264701" style=""&gt;&lt;font&gt;Here&lt;/font&gt;&lt;/a&gt; is how you can participate in the 2024 Digital Mixer&lt;font color="#000000"&gt;.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
      &lt;/td&gt;
    &lt;/tr&gt;

    &lt;tr&gt;
      &lt;td style="border-style: solid; border-width: 1px; border-color: rgb(242, 242, 242);" valign="top"&gt;
        &lt;div align="center"&gt;
          &lt;p&gt;&lt;strong&gt;&lt;font color="#01507A" face="Arial, Helvetica, sans-serif" style="font-size: 15px;"&gt;March&lt;/font&gt;&lt;/strong&gt;&lt;br&gt;&lt;/p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/YIR%202023/OISC%20March.jpg" alt="" title="" border="0" width="530" height="353"&gt;&lt;br&gt;

          &lt;p&gt;&lt;font face="Arial, Helvetica, sans-serif" style="font-size: 15px;"&gt;&lt;span style=""&gt;If it’s March, then it’s time for our Ohio Information Security Conference. Over 300 attendees enjoyed two keynotes, six learning tracks, one CISO panel and over 30 exhibitors ready to help solve their biggest cybersecurity challenges.&lt;/span&gt; &lt;a href="https://www.technologyfirst.org/Ohio-Information-Security-Conference" style=""&gt;&lt;font&gt;Here&lt;/font&gt;&lt;/a&gt; &lt;span style=""&gt;is how you can attend #OISC24.&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

          &lt;p&gt;&lt;br&gt;&lt;/p&gt;
        &lt;/div&gt;
      &lt;/td&gt;
    &lt;/tr&gt;

    &lt;tr&gt;
      &lt;td style="border-style: solid; border-width: 1px; border-color: rgb(242, 242, 242);" valign="top"&gt;
        &lt;p align="center"&gt;&lt;strong&gt;&lt;font color="#01507A" face="Arial, Helvetica, sans-serif" style="font-size: 15px;"&gt;April&lt;/font&gt;&lt;/strong&gt;&lt;br&gt;&lt;/p&gt;

        &lt;p align="center"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/YIR%202023/GRILL%20April.jpeg" alt="" title="" border="0" width="530" height="398"&gt;&lt;/p&gt;

        &lt;p align="center"&gt;&lt;font face="Arial, Helvetica, sans-serif" style="font-size: 15px;"&gt;Technology First members love to give back and a local Girls Who Code field trip to the GRILL (Gaming Research Integration for Learning Lab) was a fun way to do it. Featuring our mosaic mural, Technology First volunteers helped the chapter learn about systems engineering. Technology First members volunteer for a variety of events throughout the year. If you’d like to join us, &lt;a href="https://www.technologyfirst.org/Workforce-Initiatives/IT-Pathways" style=""&gt;&lt;font&gt;here&lt;/font&gt;&lt;/a&gt; is where you find opportunities for 2024.&lt;/font&gt;&lt;/p&gt;

        &lt;p align="center"&gt;&lt;font face="Arial, Helvetica, sans-serif" style="font-size: 15px;"&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;
      &lt;/td&gt;
    &lt;/tr&gt;

    &lt;tr&gt;
      &lt;td style="border-style: solid; border-width: 1px; border-color: rgb(242, 242, 242);" valign="top"&gt;
        &lt;p align="center"&gt;&lt;strong&gt;&lt;font color="#01507A" face="Arial, Helvetica, sans-serif" style="font-size: 15px;"&gt;May&lt;/font&gt;&lt;/strong&gt;&lt;br&gt;&lt;/p&gt;

        &lt;p align="center"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/YIR%202023/Volunteer%20appreciation%20May.jpeg" alt="" title="" border="0" width="530" height="375"&gt;&lt;/p&gt;

        &lt;p&gt;&lt;font face="Arial, Helvetica, sans-serif" style="font-size: 15px;"&gt;Speaking of volunteers, our Volunteer Appreciation Night at Poelking Lanes was a strike! The VIP Suite was the perfect place to eat, drink, bowl, and network. Thank you again to everyone who gives their time and energy to strengthen our community. Thanks also to the Technology First Board members who were able to attend and thank our volunteers in person. &lt;a href="https://www.technologyfirst.org/Board-of-Directors" style=""&gt;&lt;font&gt;Here&lt;/font&gt;&lt;/a&gt; are your current Technology First Board of Directors for 2024.&lt;/font&gt;&lt;/p&gt;
      &lt;/td&gt;
    &lt;/tr&gt;

    &lt;tr&gt;
      &lt;td style="border-style: solid; border-width: 1px; border-color: rgb(242, 242, 242);" valign="top"&gt;
        &lt;p align="center"&gt;&lt;strong&gt;&lt;font style="font-size: 15px;" color="#01507A" face="Arial, Helvetica, sans-serif"&gt;June&lt;/font&gt;&lt;/strong&gt;&lt;br&gt;&lt;/p&gt;

        &lt;p align="center"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/YIR%202023/Gen%20D%20Ignite%20June.jpeg" alt="" title="" border="0" width="530" height="455"&gt;&lt;/p&gt;

        &lt;p align="center"&gt;&lt;font face="Arial, Helvetica, sans-serif" style="font-size: 15px;"&gt;Executive Director, Melissa Cutcher, was invited to participate in a panel discussion for the Dayton Area Chamber of Commerce’s Gen D Ignite program. For their Personal Strength and Profession Growth program day, Melissa coached emerging young professional leaders on how to build their networks. If you are interested in helping further Technology First’s mission to build for the future, &lt;a href="https://www.technologyfirst.org/Workforce-Initiatives/IT-Pathways" style=""&gt;&lt;font&gt;here&lt;/font&gt;&lt;/a&gt; is how you can help in 2024.&lt;/font&gt;&lt;/p&gt;
      &lt;/td&gt;
    &lt;/tr&gt;

    &lt;tr&gt;
      &lt;td style="border-style: solid; border-width: 1px; border-color: rgb(242, 242, 242);" valign="top"&gt;
        &lt;p align="center"&gt;&lt;strong&gt;&lt;font style="font-size: 15px;" color="#01507A" face="Arial, Helvetica, sans-serif"&gt;July&lt;/font&gt;&lt;/strong&gt;&lt;br&gt;&lt;/p&gt;

        &lt;p align="center"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/YIR%202023/Summer%20Networking%20July.jpeg" alt="" title="" border="0" width="530" height="296"&gt;&lt;/p&gt;

        &lt;p align="center"&gt;&lt;font face="Arial, Helvetica, sans-serif" style="font-size: 15px;"&gt;We had an amazingly positive response to our Summer Networking Series, #UniteDaytonTech. Our first happy hour event was at Off Par Golf &amp;amp; Social in June and the tickets sold out. It was so much fun, we did it again. This time at Warped Wing Springboro and we packed the house. These events are free to members and are a great way to connect. &lt;a href="https://www.technologyfirst.org/membership" style=""&gt;&lt;font&gt;Here&lt;/font&gt;&lt;/a&gt; is how you can become a member in 2024.&lt;/font&gt;&lt;/p&gt;
      &lt;/td&gt;
    &lt;/tr&gt;

    &lt;tr&gt;
      &lt;td style="border-style: solid; border-width: 1px; border-color: rgb(242, 242, 242);" valign="top"&gt;
        &lt;div align="center"&gt;
          &lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 15px;" color="#01507A" face="Arial, Helvetica, sans-serif"&gt;August&lt;/font&gt;&lt;/strong&gt;&lt;br&gt;&lt;/p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/YIR%202023/State%20of%20Talent%20August.jpeg" alt="" title="" border="0" width="530" height="389"&gt;

          &lt;p&gt;&lt;font face="Arial, Helvetica, sans-serif" style="font-size: 15px;"&gt;Workforce continues to top the list of concerns for our technology community, so we invited Partner, TEKsystems, to present on the State of talent at our Tech Forum. We have several articles regarding the workforce on our TECH NEWS page. &lt;a href="https://www.technologyfirst.org/Tech-News"&gt;&lt;font&gt;Here&lt;/font&gt;&lt;/a&gt; is where you can read them in 2024.&lt;/font&gt; &lt;font color="#000000" face="Calibri, sans-serif" style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;br&gt;&lt;/p&gt;
        &lt;/div&gt;
      &lt;/td&gt;
    &lt;/tr&gt;

    &lt;tr&gt;
      &lt;td style="border-style: solid; border-width: 1px; border-color: rgb(242, 242, 242);" valign="top"&gt;
        &lt;p align="center"&gt;&lt;strong&gt;&lt;font style="font-size: 15px;" face="Arial, Helvetica, sans-serif"&gt;&lt;font color="#01507A"&gt;September&lt;/font&gt;&amp;nbsp;&lt;/font&gt;&lt;/strong&gt;&lt;br&gt;&lt;/p&gt;

        &lt;p align="center"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/YIR%202023/W4T%20Own%20IT%20September.jpeg" alt="" title="" border="0" width="530" height="275"&gt;&lt;/p&gt;

        &lt;p align="center"&gt;&lt;font face="Arial, Helvetica, sans-serif" style="font-size: 15px;"&gt;This was a busy month for the community. The Women 4 Technology Peer Resource Group held their first conference, Own IT! Over 125 women gathered to network and champion empowerment. Also in September, you raised $8000 for the Technology First Scholarship Fund at our annual Scramble for Scholarship Golf Outing. &lt;a href="https://www.technologyfirst.org/Scholarships" style=""&gt;&lt;font&gt;Here&lt;/font&gt;&lt;/a&gt; is how you can contribute to the Technology First Scholarship Fund in 2024.&lt;/font&gt;&lt;/p&gt;
      &lt;/td&gt;
    &lt;/tr&gt;

    &lt;tr&gt;
      &lt;td style="border-style: solid; border-width: 1px; border-color: rgb(242, 242, 242);" valign="top"&gt;
        &lt;p align="center"&gt;&lt;strong&gt;&lt;font style="font-size: 15px;" color="#01507A" face="Arial, Helvetica, sans-serif"&gt;October&lt;/font&gt;&lt;/strong&gt;&lt;br&gt;&lt;/p&gt;

        &lt;p align="center"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/YIR%202023/WFD%20PRG%20October.jpeg" alt="" title="" border="0" width="530" height="258"&gt;&lt;/p&gt;

        &lt;p align="center"&gt;&lt;font face="Arial, Helvetica, sans-serif" style="font-size: 15px;"&gt;We kicked off the regular quarterly meetings of our newest Peer Resource Group, Workforce Development. We had a very interactive panel discussion on alternative recruiting channels. Everyone is welcome to participate in this group. &lt;a href="https://www.technologyfirst.org/Technology-First-Events" style=""&gt;&lt;font&gt;Here&lt;/font&gt;&lt;/a&gt; is how you can attend discussions in 2024.&lt;/font&gt;&lt;/p&gt;
      &lt;/td&gt;
    &lt;/tr&gt;

    &lt;tr&gt;
      &lt;td style="border-style: solid; border-width: 1px; border-color: rgb(242, 242, 242);" valign="top"&gt;
        &lt;p align="center"&gt;&lt;strong&gt;&lt;font style="font-size: 15px;" color="#01507A" face="Arial, Helvetica, sans-serif"&gt;November&lt;/font&gt;&lt;/strong&gt;&lt;br&gt;&lt;/p&gt;

        &lt;p align="center"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/YIR%202023/LA%20Winners%20ALL%20for%20November.jpg" alt="" title="" border="0" width="530" height="353"&gt;&lt;/p&gt;

        &lt;p align="center"&gt;&lt;font face="Arial, Helvetica, sans-serif" style="font-size: 15px;"&gt;The 17&lt;sup style=""&gt;th&lt;/sup&gt; Annual Taste of IT Conference sold out again this year. We met 470 of our closest friends at the intersection of tactics and trends and shared our knowledge and networks. We enjoyed a great morning keynote from Gary Sorrentino, Global CIO of Zoom, an engaging lunch panel discussion around Industrial AI, 24 breakout sessions, and solutions from 36 providers. Capping off the conference, we recognized technology talent from the Dayton region at our 10&lt;sup style=""&gt;th&lt;/sup&gt; Annual Technology First Leadership Awards. &lt;a href="https://www.technologyfirst.org/toit-2023" style=""&gt;&lt;font&gt;Here&lt;/font&gt;&lt;/a&gt; is information for the &lt;font face="Arial, Helvetica, sans-serif" style="font-size: 15px;"&gt;conference in 2024.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
      &lt;/td&gt;
    &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;

&lt;p&gt;&lt;font face="Arial, Helvetica, sans-serif" style="font-size: 15px;"&gt;Thank you to our Board, Committees, Partners, Sponsors, and Members for connecting, strengthening, and championing your community this year! We are already looking forward to what 2024 will bring!&lt;/font&gt;&lt;/p&gt;&lt;br&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13284800</link>
      <guid>https://www.technologyfirst.org/Tech-News/13284800</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Tue, 28 Nov 2023 16:13:27 GMT</pubDate>
      <title>The Privacy and Security Risks of “Citizen Development”</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/Dave%20Hatter%20copy.jpg" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Arial, Helvetica, sans-serif" style="font-size: 14px;"&gt;&lt;span data-contrast="auto"&gt;&lt;strong&gt;&lt;font&gt;&lt;span data-ccp-parastyle="Normal (Web)"&gt;The Privacy and Security Risks of “Citizen Development&lt;/span&gt;&lt;span data-ccp-parastyle="Normal (Web)"&gt;”&lt;/span&gt;&lt;/font&gt;&lt;/strong&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Arial, Helvetica, sans-serif" style="font-size: 14px;"&gt;Marc&amp;nbsp;Andreessen, founder of Netscape&amp;nbsp;and&amp;nbsp;a&amp;nbsp;well-known technology investor,&amp;nbsp;famously said “‘Software is Eating the World”&amp;nbsp;way back in 2011&amp;nbsp;and&amp;nbsp;it’s&amp;nbsp;obvious now that&amp;nbsp;he&amp;nbsp;was&amp;nbsp;right. We live in a&amp;nbsp;Software&amp;nbsp;Defined Everything (SDE) world where&amp;nbsp;even your coffee maker is “smart”,&amp;nbsp;and the trend&amp;nbsp;of software in everything&amp;nbsp;shows no signs of slowing&amp;nbsp;down.In fact,&amp;nbsp;it’s&amp;nbsp;estimated there will be 76 billion Internet of Things (IoT) aka “smart devices”,each driven by software,&amp;nbsp;online by 2025,&amp;nbsp;and Microsoft has said&amp;nbsp;there will be&amp;nbsp;a whopping&amp;nbsp;500 million new apps built over the next five years.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Arial, Helvetica, sans-serif" style="font-size: 14px;"&gt;All&amp;nbsp;this software is&amp;nbsp;driving&amp;nbsp;the&amp;nbsp;rapid&amp;nbsp;digital transformation of our world&amp;nbsp;and while the&amp;nbsp;demand for software development has never been higher, it&amp;nbsp;greatly outstrips&amp;nbsp;the&amp;nbsp;available&amp;nbsp;supply. Gartner reported that demand for software development will grow five times faster than&amp;nbsp;conventional IT departments and the average IT project backlog is between 3 and 12&amp;nbsp;months per Appian.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Arial, Helvetica, sans-serif" style="font-size: 14px;"&gt;Compounding the issue is the&amp;nbsp;growing&amp;nbsp;shortage&amp;nbsp;of software developers. Forrester&amp;nbsp;has reported that there will&amp;nbsp;a shortage of 500,000 developers in the United States&amp;nbsp;by 2024&amp;nbsp;and&amp;nbsp;IDC has reported the shortage of software developers may reach 4,000,000&amp;nbsp;worldwide&amp;nbsp;by 2025.&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Arial, Helvetica, sans-serif" style="font-size: 14px;"&gt;To&amp;nbsp;quench&amp;nbsp;the demand&amp;nbsp;for software development&amp;nbsp;and&amp;nbsp;to&amp;nbsp;accelerate&amp;nbsp;value&amp;nbsp;delivery&amp;nbsp;many organizations have embraced&amp;nbsp;“Citizen&amp;nbsp;Development”.&amp;nbsp;Citizen Development democratizes software development&amp;nbsp;by allowing “Citizen Developers”-&amp;nbsp;individuals with little&amp;nbsp;or&amp;nbsp;no&amp;nbsp;programming&amp;nbsp;experience&amp;nbsp;-&amp;nbsp;to use&amp;nbsp;low-code or no-code&amp;nbsp;(LCNC)&amp;nbsp;tools&amp;nbsp;to&amp;nbsp;quickly&amp;nbsp;build&amp;nbsp;and deploy software&amp;nbsp;applications.&amp;nbsp;LCNC&amp;nbsp;tools are rapidly growing in popularity, Gartner predicts&amp;nbsp;that by 2025, 70% of enterprises will use&amp;nbsp;LCNC&amp;nbsp;tools&amp;nbsp;and&amp;nbsp;LCNC&amp;nbsp;platforms expected to reach&amp;nbsp;$187 billion&amp;nbsp;in sales by 2030 according to Research and Markets.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Arial, Helvetica, sans-serif" style="font-size: 14px;"&gt;This&amp;nbsp;is a fundamental shift in how organizations build and&amp;nbsp;maintain&amp;nbsp;software applications. Individuals without&amp;nbsp;an&amp;nbsp;extensive technical background can&amp;nbsp;build business ready applications&amp;nbsp;using visual interfaces and pre-built components&amp;nbsp;with little or no coding&amp;nbsp;required.&amp;nbsp;Readily available&amp;nbsp;LCNC&amp;nbsp;tools&amp;nbsp;such asMicrosoft Power Apps, Appian,&amp;nbsp;Zoho,&amp;nbsp;Quickbase, and Salesforce Lightning&amp;nbsp;allow&amp;nbsp;business&amp;nbsp;professionals&amp;nbsp;with domain knowledge&amp;nbsp;to create applications tailored to their specific needs without waiting for&amp;nbsp;or relying on&amp;nbsp;traditional software developers&amp;nbsp;in the IT department or&amp;nbsp;at&amp;nbsp;an external&amp;nbsp;consulting company.&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Arial, Helvetica, sans-serif" style="font-size: 14px;"&gt;The reasons for the growing popularity of&amp;nbsp;Citizen&amp;nbsp;Development&amp;nbsp;include:&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;div style="margin-left: 2em"&gt;
  &lt;ul&gt;
    &lt;li&gt;&lt;font face="Arial, Helvetica, sans-serif" style="font-size: 14px;"&gt;Speed:&amp;nbsp;Citizen developers can build and deploy applications&amp;nbsp;very&amp;nbsp;quickly&amp;nbsp;compared&amp;nbsp;to traditional approaches.&amp;nbsp;&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Arial, Helvetica, sans-serif" style="font-size: 14px;"&gt;Agility:&amp;nbsp;Non-technical&amp;nbsp;people&amp;nbsp;can&amp;nbsp;meet&amp;nbsp;business&amp;nbsp;needs and&amp;nbsp;address&amp;nbsp;challenges&amp;nbsp;themselves.&amp;nbsp;Additionally, these&amp;nbsp;solutions are typically easy to&amp;nbsp;modify&amp;nbsp;as&amp;nbsp;business&amp;nbsp;needs&amp;nbsp;evolve.&amp;nbsp;&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Arial, Helvetica, sans-serif" style="font-size: 14px;"&gt;Empowerment:Virtually any&amp;nbsp;knowledgeable&amp;nbsp;and&amp;nbsp;motivated employee&amp;nbsp;can contribute directly to digital transformation efforts.&amp;nbsp;&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Arial, Helvetica, sans-serif" style="font-size: 14px;"&gt;Cost: Organizations can reduce their reliance on&amp;nbsp;professional&amp;nbsp;programmers,&amp;nbsp;cutting&amp;nbsp;costs&amp;nbsp;and&amp;nbsp;allowing better use of resources.&amp;nbsp;&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Arial, Helvetica, sans-serif" style="font-size: 14px;"&gt;Innovation: Domain experts can quickly build prototypes or fully working applications&amp;nbsp;with little effort or risk.&amp;nbsp;&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;p&gt;&lt;font face="Arial, Helvetica, sans-serif" style="font-size: 14px;"&gt;As a result of the&amp;nbsp;exploding&amp;nbsp;popularity&amp;nbsp;of&amp;nbsp;LCNC tools&amp;nbsp;and the benefits they deliver,&amp;nbsp;organizations&amp;nbsp;of all sizes&amp;nbsp;may find themselves&amp;nbsp;leveraging&amp;nbsp;LCNC&amp;nbsp;tools.&amp;nbsp;And while the democratization of software development can significantly speed project delivery and reduce demand on traditional IT departments,&amp;nbsp;like many “Shadow IT” solutions that originate outside the IT department,&amp;nbsp;Citizen&amp;nbsp;Development&amp;nbsp;introduces&amp;nbsp;privacy and security concerns for organizations that employ it.&amp;nbsp;For example, non-technical users might not be aware of privacy concerns or&amp;nbsp;security&amp;nbsp;best practices,&amp;nbsp;leaving&amp;nbsp;their&amp;nbsp;applications more susceptible to attacks or leaks.Increasingly frequent and increasingly devastating cyberattacks&amp;nbsp;demand&amp;nbsp;that&amp;nbsp;organizations&amp;nbsp;understand and&amp;nbsp;address&amp;nbsp;these concerns.&amp;nbsp;Let’s&amp;nbsp;examine&amp;nbsp;each in more detail.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Arial, Helvetica, sans-serif" style="font-size: 14px;"&gt;Citizen DevelopmentPrivacy Risks:&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;div style="margin-left: 2em"&gt;
  &lt;ul&gt;
    &lt;li&gt;&lt;font face="Arial, Helvetica, sans-serif" style="font-size: 14px;"&gt;Compliance Issues: Privacy regulations such as GDPR, HIPAA and&amp;nbsp;CCPA require organizations to protect personal data.&amp;nbsp;Lack of&amp;nbsp;compliance&amp;nbsp;creates&amp;nbsp;the potential for&amp;nbsp;large&amp;nbsp;fines.&amp;nbsp;&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Arial, Helvetica, sans-serif" style="font-size: 14px;"&gt;Data Leakage/Theft: Citizen developers may inadvertently expose sensitive data&amp;nbsp;through&amp;nbsp;misconfigured&amp;nbsp;access controls, misconfigured platforms&amp;nbsp;or&amp;nbsp;by&amp;nbsp;sharing data with unauthorized users. This can result in data breaches, regulatory fines, and reputational damage.&amp;nbsp;&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Arial, Helvetica, sans-serif" style="font-size: 14px;"&gt;Lack of&amp;nbsp;Encryption:&amp;nbsp;Citizen developers may not&amp;nbsp;understand and/or&amp;nbsp;prioritize encryption when designing applications, leaving data vulnerable to interception or theft.&amp;nbsp;&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;p&gt;&lt;font face="Arial, Helvetica, sans-serif" style="font-size: 14px;"&gt;Citizen Development Security Risks:&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;div style="margin-left: 2em"&gt;
  &lt;ul&gt;
    &lt;li&gt;&lt;font face="Arial, Helvetica, sans-serif" style="font-size: 14px;"&gt;Authentication and Authorization&amp;nbsp;Issues: Citizen developers may not be aware of best practices&amp;nbsp;to&amp;nbsp;secure&amp;nbsp;user accessor may not understand&amp;nbsp;the sensitivity of data&amp;nbsp;leading&amp;nbsp;to unauthorized access&amp;nbsp;and/or data breach.&amp;nbsp;&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Arial, Helvetica, sans-serif" style="font-size: 14px;"&gt;Patch Management: Citizen developers may not&amp;nbsp;keep&amp;nbsp;tools updated with the latest security patches. This can leave applications exposed to known vulnerabilities.&amp;nbsp;&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Arial, Helvetica, sans-serif" style="font-size: 14px;"&gt;Software Vulnerabilities: Citizen-developed applications may&amp;nbsp;be missing&amp;nbsp;proper security measures, making them susceptible to&amp;nbsp;all-too-common&amp;nbsp;vulnerabilities&amp;nbsp;such as&amp;nbsp;SQL injection, cross-site scripting (XSS), and cross-site request forgery (CSRF).&amp;nbsp;&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Arial, Helvetica, sans-serif" style="font-size: 14px;"&gt;Integration Risks: Integrating citizen-developed applications with existing systems can introduce security vulnerabilities&amp;nbsp;that cascade across systems.&amp;nbsp;&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Arial, Helvetica, sans-serif" style="font-size: 14px;"&gt;Backup and Disaster Recovery:&amp;nbsp;Citizen developers may not understand the terms of service of LCNC platform-as-a-service&amp;nbsp;(PaaS)&amp;nbsp;offerings&amp;nbsp;or prioritize continuity of critical systems&amp;nbsp;which could lead to gaps in data protection&amp;nbsp;and downtime.&amp;nbsp;&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Arial, Helvetica, sans-serif" style="font-size: 14px;"&gt;Vulnerabilities in Third-Party Components:&amp;nbsp;LCNC&amp;nbsp;platforms&amp;nbsp;often&amp;nbsp;rely on third-party components and integrations&amp;nbsp;whose lineage and security posture&amp;nbsp;are&amp;nbsp;unclear.&amp;nbsp;Security vulnerabilities&amp;nbsp;in third-party&amp;nbsp;components&amp;nbsp;can expose applications to attacks.&amp;nbsp;This speaks strongly to the need for a Software Bill of Materials (SBOM)&amp;nbsp;to understand dependencies and lineage.&amp;nbsp;&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Arial, Helvetica, sans-serif" style="font-size: 14px;"&gt;Limited&amp;nbsp;Testing: Citizen developers may not have the&amp;nbsp;expertise&amp;nbsp;or resources to conduct thorough security testing.&amp;nbsp;&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;p&gt;&lt;font face="Arial, Helvetica, sans-serif" style="font-size: 14px;"&gt;Organizations&amp;nbsp;should ensure&amp;nbsp;they address the following to&amp;nbsp;reduce the risks of Citizen Development:&amp;nbsp;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

&lt;div style="margin-left: 2em"&gt;
  &lt;ul&gt;
    &lt;li&gt;&lt;font face="Arial, Helvetica, sans-serif" style="font-size: 14px;"&gt;Training and Awareness:&amp;nbsp;Require&amp;nbsp;training programs to educate citizen developers about privacy and security best practices&amp;nbsp;to ensure&amp;nbsp;they&amp;nbsp;take&amp;nbsp;prudent steps to protect&amp;nbsp;the&amp;nbsp;privacy and security&amp;nbsp;of LCNC&amp;nbsp;applications.&amp;nbsp;&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Arial, Helvetica, sans-serif" style="font-size: 14px;"&gt;Secure By Design:&amp;nbsp;Security should never be an afterthought or retrofitted&amp;nbsp;to existing applications.&amp;nbsp;Ensure that citizen developed applications are secure by design. Involve security professionals to&amp;nbsp;provide&amp;nbsp;guidance&amp;nbsp;and to design&amp;nbsp;security into applications.&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Arial, Helvetica, sans-serif" style="font-size: 14px;"&gt;Access Controls and Permissions:&amp;nbsp;Ensure that developers understand&amp;nbsp;the&amp;nbsp;sensitivity&amp;nbsp;of the data they have access to&amp;nbsp;and implement robust access controls and permissions&amp;nbsp;commensurate&amp;nbsp;with&amp;nbsp;the data&amp;nbsp;sensitivity. Regularly review and update&amp;nbsp;permissions.&amp;nbsp;&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Arial, Helvetica, sans-serif" style="font-size: 14px;"&gt;Integration with Identity and Access Management (IAM): Integrate&amp;nbsp;LCNC&amp;nbsp;platforms with organizational&amp;nbsp;IAM systems&amp;nbsp;to ensure that user identities are managed securely and consistently.&amp;nbsp;For&amp;nbsp;example,&amp;nbsp;Single Sign On (SSO) with Active Directory.&amp;nbsp;&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Arial, Helvetica, sans-serif" style="font-size: 14px;"&gt;Encryption: Encourage the use of encryption for sensitive dataat rest and in transit.&amp;nbsp;&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Arial, Helvetica, sans-serif" style="font-size: 14px;"&gt;Regular Auditing and Monitoring: Continuously&amp;nbsp;monitor&amp;nbsp;and audit citizen-developed applications for unusual activity or unauthorized access. Implement automated alerts for&amp;nbsp;anomalous&amp;nbsp;behavior.&amp;nbsp;&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Arial, Helvetica, sans-serif" style="font-size: 14px;"&gt;Centralized Governance:&amp;nbsp;Establish&amp;nbsp;a governance framework&amp;nbsp;to&amp;nbsp;centralize control over citizen-developed applications&amp;nbsp;including&amp;nbsp;approval processes, version control,&amp;nbsp;maintenance,&amp;nbsp;and compliance checks.&amp;nbsp;&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Arial, Helvetica, sans-serif" style="font-size: 14px;"&gt;Vendor Assessment:&amp;nbsp;Assess vendor&amp;nbsp;security and compliance measures&amp;nbsp;to ensure&amp;nbsp;they meet organizational&amp;nbsp;standards&amp;nbsp;and compliance&amp;nbsp;requirements.&amp;nbsp;For example,&amp;nbsp;review their SLA/SLO’s,&amp;nbsp;ask for&amp;nbsp;an&amp;nbsp;independent&amp;nbsp;SOC 2 Type 2 audit, and&amp;nbsp;request&amp;nbsp;a Software Bill of Materials (SBOM).&amp;nbsp;&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Arial, Helvetica, sans-serif" style="font-size: 14px;"&gt;Data Lifecycle Management: Define clear data retention policies for citizen-developed applications.&amp;nbsp;&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Arial, Helvetica, sans-serif" style="font-size: 14px;"&gt;Penetration Testing: Conduct regular penetration testing to&amp;nbsp;identify&amp;nbsp;and&amp;nbsp;correct&amp;nbsp;vulnerabilities.&amp;nbsp;&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Arial, Helvetica, sans-serif" style="font-size: 14px;"&gt;Leverage existing resources: The Project Management Institute (PMI) has excellent&amp;nbsp;vendor-agnostic&amp;nbsp;educational resources&amp;nbsp;and tools&amp;nbsp;for&amp;nbsp;Citizen Development. I recently completed the PMI Citizen&amp;nbsp;DeveloperTMPractitioner&amp;nbsp;course and recommend it for those looking to engage in Citizen Development.&amp;nbsp;You can learn more&amp;nbsp;&lt;a href="https://www.pmi.org/citizen-developer/courses/developer-practitioner" target="_blank"&gt;here&lt;/a&gt;.&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;p&gt;&lt;font face="Arial, Helvetica, sans-serif" style="font-size: 14px;"&gt;The advent of&amp;nbsp;LCNC&amp;nbsp;platforms has revolutionized the way&amp;nbsp;software&amp;nbsp;is&amp;nbsp;developed&amp;nbsp;and&amp;nbsp;it&amp;nbsp;offers&amp;nbsp;immense potential for organizations seeking&amp;nbsp;speed,&amp;nbsp;agility&amp;nbsp;and efficiency.&amp;nbsp;&amp;nbsp;However, the convenience and accessibility of citizen development&amp;nbsp;brings&amp;nbsp;inherent privacy and security risks&amp;nbsp;that must be&amp;nbsp;addressed&amp;nbsp;proactively,&amp;nbsp;and organizations&amp;nbsp;should strive to&amp;nbsp;strike a balance between&amp;nbsp;fosteringCitizen&amp;nbsp;Development&amp;nbsp;and safeguarding sensitive data.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Arial, Helvetica, sans-serif" style="font-size: 14px;"&gt;A&amp;nbsp;well-executed citizen development strategy can empower employees, drive innovation, and&amp;nbsp;significantly&amp;nbsp;contribute to the overall success of digital transformation initiatives.By investing in training, robust security,&amp;nbsp;trustworthy platforms&amp;nbsp;and a&amp;nbsp;good&amp;nbsp;governance framework, organizations can&amp;nbsp;leverage&amp;nbsp;the power of&amp;nbsp;Citizen&amp;nbsp;Development while minimizing the associated risks.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Arial, Helvetica, sans-serif" style="font-size: 14px;"&gt;Dave Hatter, Cybersecurity Consultant, Intrust IT –&amp;nbsp;CISSP, CISA, CISM, CCSP, CSSLP, PMP, PMI-ACP, PMI-PBA, PSM 1, PSD1, ITIL&amp;nbsp;&lt;/font&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13284443</link>
      <guid>https://www.technologyfirst.org/Tech-News/13284443</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Sun, 29 Oct 2023 20:34:24 GMT</pubDate>
      <title>Technology Leadership in the Post-COVID World</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/Sarah%20Trimble-Oliver%20Blog.png" alt="" title="" border="0"&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Verdana" style="font-size: 15px;"&gt;&lt;font color="#4D5758"&gt;During the COVID pandemic, we&lt;/font&gt; experienced lockdowns, illness and death, loneliness, working from home, learning from home, disrupted supply chains, overtaxed health systems, non-stop media reports about COVID, and daily anxiety and stress.&amp;nbsp;&amp;nbsp; Although U.S. and global health organizations declared the end of the COVID public health emergency, the effects linger, including many workplace disruptions.&amp;nbsp; Being a good leader of people in any industry means reflecting on social context and social disruptions and how our own leadership skills and style must adapt.&amp;nbsp; Because every organization’s competitive advantage relies increasingly on technology in this age, it is even more important for technology leaders to pivot to changing workplace conditions. How are you adjusting in response to these disruptions?&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font color="#4D5758"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;&lt;strong style=""&gt;&lt;font color="#4D5758" style=""&gt;1. Hybrid&lt;/font&gt; and Remote Workplace&lt;/strong&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:360,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}" style=""&gt;&lt;font color="#4D5758" style=""&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;&lt;span data-contrast="auto" style="color: rgb(0, 0, 0);"&gt;&lt;font color="#4D5758"&gt;For many roles in the workplace, w&lt;/font&gt;e are not going back to the old way of working - physically in the office building five days a week, 8 am-5 pm.&amp;nbsp; According to&lt;/span&gt; &lt;a href="https://www.forbes.com/sites/jenamcgregor/2023/03/30/full-time-remote-work-is-falling-but-still-five-times-pre-pandemic-levels-survey-finds/?sh=6b11c029466f" style=""&gt;&lt;font style="" color="#009AC6"&gt;&lt;span data-ccp-charstyle="Hyperlink" style=""&gt;&lt;span data-contrast="none" style=""&gt;Forbes&lt;/span&gt;&lt;/span&gt;&lt;/font&gt;&lt;/a&gt;&lt;span data-contrast="auto" style="color: rgb(0, 0, 0);"&gt;&lt;font color="#4D5758"&gt;, o&lt;/font&gt;f the jobs that can be done remotely, 7% of workers were fully remote before the pandemic, and in 2023, it is five times higher at 35%.&amp;nbsp;&amp;nbsp; Workers are very clear about what they expect from their employer, according to&lt;/span&gt; &lt;a href="https://www.forbes.com/advisor/business/remote-work-statistics/" style=""&gt;&lt;font style="" color="#009AC6"&gt;&lt;span data-ccp-charstyle="Hyperlink" style=""&gt;&lt;span data-contrast="none" style=""&gt;Forbes’ remote work statistics&lt;/span&gt;&lt;/span&gt;&lt;/font&gt;&lt;/a&gt;&lt;span data-contrast="auto" style=""&gt;&lt;font style="" color="#009AC6"&gt;,&lt;/font&gt;&lt;font color="#000000"&gt;&amp;nbsp; “98% of workers want to work remotely at least some of the time and 65% of workers want to work remotely ALL of the time.&amp;nbsp; Fifty-seven percent of workers would look for a new job if their current company didn’t allow remote work.”&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}" style="color: rgb(0, 0, 0);"&gt;&lt;font color="#4D5758"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;&lt;span data-contrast="auto" style="color: rgb(0, 0, 0);"&gt;&lt;font color="#4D5758"&gt;But there are&lt;/font&gt; also downsides to remote work. From the same&lt;/span&gt; &lt;a href="https://www.forbes.com/advisor/business/remote-work-statistics/" style=""&gt;&lt;font style="" color="#009AC6"&gt;&lt;span data-ccp-charstyle="Hyperlink" style=""&gt;&lt;span data-contrast="none" style=""&gt;Forbes report&lt;/span&gt;&lt;/span&gt;&lt;/font&gt;&lt;/a&gt;&lt;span data-contrast="auto" style="color: rgb(0, 0, 0);"&gt;&lt;font color="#4D5758"&gt;, “&lt;/font&gt;69% of remote workers report increased burnout from digital communication tools, 53% of remote workers say it’s harder to feel connected to coworkers, and 23% of remote workers struggle with loneliness.”&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}" style="color: rgb(0, 0, 0);"&gt;&lt;font color="#4D5758"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;&lt;span data-contrast="auto" style="color: rgb(0, 0, 0);"&gt;&lt;font color="#4D5758"&gt;M&lt;/font&gt;any large corporations have recently begun return-to-office mandates:&amp;nbsp; Google, Meta, JP Morgan Chase, Amazon, Apple, Starbucks, Disney, Lyft, and Zoom. This has set up a conflict between what employees want and what employers want.&amp;nbsp;&amp;nbsp; Currently, organizations that can give workers some flexibility will be better poised for recruiting and retaining talent.&amp;nbsp;&amp;nbsp; If you do implement a mandate for in-person work,&lt;/span&gt; &lt;a href="https://www.cnbc.com/2023/06/29/in-return-to-office-messaging-theres-now-more-stick-less-carrot.html#:~:text=Google%2C%20JP%20Morgan%20Chase%2C%20and,isn't%20optional%20employee%20policy." style=""&gt;&lt;font style="" color="#009AC6"&gt;&lt;span data-ccp-charstyle="Hyperlink" style=""&gt;&lt;span data-contrast="none" style=""&gt;CNBC Leadership Insights&lt;/span&gt;&lt;/span&gt;&lt;/font&gt;&lt;/a&gt; &lt;span data-contrast="auto" style="color: rgb(0, 0, 0);"&gt;&lt;font color="#4D5758"&gt;recommends:&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}" style="color: rgb(0, 0, 0);"&gt;&lt;font color="#4D5758"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;div style="margin-left: 2em"&gt;
  &lt;ul&gt;
    &lt;li&gt;&lt;font color="#000000" face="Times New Roman, serif" style="font-size: 15px;"&gt;&lt;span data-contrast="auto"&gt;&lt;font color="#4D5758" face="Verdana, sans-serif"&gt;Explain the specific “&lt;/font&gt;Whys”&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:256}"&gt;&lt;font color="#4D5758" face="Verdana, sans-serif"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font color="#000000" face="Times New Roman, serif" style="font-size: 15px;"&gt;&lt;span data-contrast="auto"&gt;&lt;font color="#4D5758" face="Verdana, sans-serif"&gt;Look closely at&lt;/font&gt; individual and team performance data&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:256}"&gt;&lt;font color="#4D5758" face="Verdana, sans-serif"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font color="#000000" face="Times New Roman, serif" style="font-size: 15px;"&gt;&lt;span data-contrast="auto"&gt;&lt;font color="#4D5758" face="Verdana, sans-serif"&gt;Leave room for exceptions&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:256}"&gt;&lt;font color="#4D5758" face="Verdana, sans-serif"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font color="#000000" face="Times New Roman, serif" style="font-size: 15px;"&gt;&lt;span data-contrast="auto"&gt;&lt;font color="#4D5758" face="Verdana, sans-serif"&gt;Build flexibility in other ways&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font color="#4D5758" face="Verdana, sans-serif"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font color="#000000" face="Times New Roman, serif" style="font-size: 15px;"&gt;&lt;span data-contrast="auto"&gt;&lt;font color="#4D5758" face="Verdana, sans-serif"&gt;Watch for proximity bias&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:256}"&gt;&lt;font color="#4D5758" face="Verdana, sans-serif"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font color="#000000" face="Times New Roman, serif" style="font-size: 15px;"&gt;&lt;span data-contrast="auto"&gt;&lt;font color="#4D5758" face="Verdana, sans-serif"&gt;Be ready to lose employees&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:256}"&gt;&lt;font color="#4D5758" face="Verdana, sans-serif"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;p&gt;&lt;font face="Times New Roman, serif"&gt;&lt;span data-contrast="auto" style=""&gt;&lt;strong style=""&gt;&lt;font color="#4D5758" face="Verdana, sans-serif" style="font-size: 15px;"&gt;2. Stress, Trauma, Mental Health&lt;/font&gt;&lt;/strong&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:360,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}" style="color: rgb(0, 0, 0);"&gt;&lt;font style="font-size: 16px;"&gt;&lt;font color="#4D5758" face="Verdana, sans-serif" style="font-size: 20px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 15px;"&gt;There has been a measurable rise in negative emotions around the globe, including stress, sadness, anger, and worry, according to an &lt;a href="https://news.gallup.com/poll/507725/global-rise-unhappiness-stalls.aspx" target="_blank"&gt;annual measure&lt;/a&gt; by Gallup. The pandemic caused a spike in the world of unhappiness and we have not yet recovered.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000"&gt;&lt;span data-contrast="auto"&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/Picture1.png" alt="" title="" border="0"&gt;&amp;nbsp;&lt;/font&gt;&lt;font face="Times New Roman, serif"&gt;&lt;font style="font-size: 32px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/font&gt;&lt;/span&gt; &lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font style="font-size: 16px;"&gt;&lt;font color="#4D5758" face="Verdana, sans-serif" style="font-size: 20px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font&gt;&lt;font style=""&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;&lt;font color="#4D5758" style="color: rgb(0, 0, 0);"&gt;In the workplace,&lt;/font&gt; &lt;font color="#009AC6"&gt;&lt;a href="https://www.gallup.com/workplace/468233/employee-engagement-needs-rebound-2023.aspx" style=""&gt;&lt;font style=""&gt;&lt;span data-ccp-charstyle="Hyperlink" style=""&gt;&lt;span data-contrast="none" style=""&gt;Gallup finds&lt;/span&gt;&lt;/span&gt;&lt;/font&gt;&lt;/a&gt;&lt;/font&gt; &lt;span data-contrast="auto" style=""&gt;&lt;font color="#4D5758" style="color: rgb(0, 0, 0);"&gt;that employee engagement dropped in 2021 for the first time in a decade and dropped again in 2022.&lt;/font&gt; Our workforce is unhappy and disengaged at record levels. Why?&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}" style=""&gt;&lt;font color="#4D5758" style=""&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font&gt;&lt;font style=""&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;&lt;span data-contrast="auto" style="color: rgb(0, 0, 0);"&gt;&lt;font color="#4D5758" style=""&gt;CAUSE&lt;/font&gt; #1 – POST-COVID STRESS DISORDER -“Illness, grief, job loss, social isolation, uncertainty, and other pandemic-driven stressors have contributed to an increase in psychological stress,” according to&lt;/span&gt; &lt;a href="https://medicine.yale.edu/news-article/covid-19-and-ptsd-assessing-the-pandemics-toll-on-mental-health/" style=""&gt;&lt;font style=""&gt;&lt;span data-ccp-charstyle="Hyperlink" style=""&gt;&lt;span data-contrast="none" style=""&gt;&lt;font color="#009AC6"&gt;Yale School of Medicin&lt;/font&gt;&lt;font color="#000000"&gt;e&lt;/font&gt;&lt;/span&gt;&lt;/span&gt;&lt;/font&gt;&lt;/a&gt;&lt;span data-contrast="auto" style=""&gt;&lt;font color="#4D5758" style="color: rgb(0, 0, 0);"&gt;.&lt;/font&gt; &lt;font color="#000000"&gt;There is a new disorder identified as&lt;/font&gt; &lt;a href="https://www.centerforanxietydisorders.com/are-you-struggling-with-covid-stress-syndrome-or-covid-ptsd/" style=""&gt;&lt;span data-ccp-charstyle="Hyperlink" style=""&gt;&lt;font style=""&gt;&lt;span data-contrast="none" style=""&gt;&lt;font color="#009AC6"&gt;Post-COVID Stress&lt;/font&gt; &lt;font color="#000000"&gt;Disorder&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span data-contrast="auto" style="color: rgb(0, 0, 0);"&gt;&lt;font color="#4D5758"&gt;,&lt;/font&gt; which presents similar to PTSD including increased reaction to stimuli, avoidance, focusing on the negative aspects of a situation, incessant contemplation of negative events, and anxious arousal associated with memories of the COVID-19 pandemic.&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:450,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}" style="color: rgb(0, 0, 0);"&gt;&lt;font color="#4D5758"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font&gt;&lt;font style=""&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;&lt;span data-contrast="auto" style="color: rgb(0, 0, 0);"&gt;&lt;font color="#4D5758"&gt;CAUSE&lt;/font&gt; #2 – SOCIAL MEDIA -&amp;nbsp;&lt;/span&gt; &lt;a href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10129173/#:~:text=Passive%20social%20media%20use%20can,both%20friends%20and%20family32." style=""&gt;&lt;font style="" color="#009AC6"&gt;&lt;span data-ccp-charstyle="Hyperlink" style=""&gt;&lt;span data-contrast="none" style=""&gt;National Institutes of Health&lt;/span&gt;&lt;/span&gt;&lt;/font&gt;&lt;/a&gt; &lt;span data-contrast="auto" style="color: rgb(0, 0, 0);"&gt;&lt;font color="#4D5758"&gt;states that s&lt;/font&gt;ocial media is strongly correlated with “anxiety, depression, insomnia, stress, decreased happiness, and a sense of mental deprivation.” This correlation is caused by the “negative impact on self-esteem through unhealthy comparisons, social media burnout, stress, lack of emotional regulation due to social media preoccupation, and development of social anxiety due to decreased real-life social interactions.” FOMO (Fear Of Missing Out) is a real thing, with real mental health consequences.&amp;nbsp;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:450,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}" style="color: rgb(0, 0, 0);"&gt;&lt;font color="#4D5758"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000"&gt;&lt;font&gt;&lt;font color="#000000" face="Verdana" style="font-size: 15px;"&gt;&lt;span data-contrast="auto" style=""&gt;&lt;font color="#4D5758"&gt;Because&lt;/font&gt; our workforce is seeing heightened stress and general unhappiness, leaders must be aware of, and manage, employee engagement and well-being.&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}" style=""&gt;&lt;font color="#4D5758" style=""&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000"&gt;&lt;font&gt;&lt;font color="#000000" face="Times New Roman, serif" style="font-size: 15px;"&gt;&lt;strong style=""&gt;&lt;font color="#4D5758" face="Verdana, sans-serif" style=""&gt;3. Generational Disruption&lt;/font&gt;&lt;/strong&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:360,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}" style=""&gt;&lt;font color="#4D5758" face="Verdana, sans-serif" style=""&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font&gt;&lt;font style=""&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;&lt;span data-contrast="auto" style=""&gt;&lt;font color="#4D5758" style=""&gt;In conjunction with disruptions related to the pandemic,&lt;/font&gt; Gen Z’s entry into the workforce is driving change, due to different norms and values regarding workplace atmosphere, culture, and support. By 2030, Generation Z will constitute about 30% of the workforce. While generational stereotypes are not 100% accurate for each individual, data from&lt;/span&gt; &lt;a href="https://imagine.jhu.edu/blog/2023/04/18/gen-z-in-the-workplace-how-should-companies-adapt/" style=""&gt;&lt;font color="#009AC6"&gt;&lt;span data-ccp-charstyle="Hyperlink" style=""&gt;&lt;span data-contrast="none" style=""&gt;Johns Hopkins University&lt;/span&gt;&lt;/span&gt;&lt;/font&gt;&lt;/a&gt; &lt;span data-contrast="auto" style=""&gt;indicates that, in general, “Baby Boomers sought job security, Generation X sought work-life balance and professional progress, Millennials and Generation Z are seeking greater Diversity, Equity, and Inclusion (DEI), greater flexibility, and a focus on ethics and social awareness of a company.” Gen Z is also seeing a lack of engagement at work leading to lower retention and higher levels of stress that impact work performance.&amp;nbsp;&lt;/span&gt; &lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}" style=""&gt;&lt;font color="#4D5758"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font&gt;&lt;font&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;&lt;span data-contrast="auto"&gt;&lt;font&gt;According to&lt;/font&gt;&lt;/span&gt; &lt;a href="https://www.mckinsey.com/capabilities/people-and-organizational-performance/our-insights/gen-what-debunking-age-based-myths-about-worker-preferences"&gt;&lt;font&gt;&lt;span data-ccp-charstyle="Hyperlink"&gt;&lt;span data-contrast="none"&gt;McKinsey&lt;/span&gt;&lt;span data-ccp-charstyle="Hyperlink"&gt;,&lt;/span&gt;&lt;/span&gt;&lt;/font&gt;&lt;/a&gt; &lt;font&gt;&lt;span data-contrast="auto"&gt;factors that motivate Gen Z to stay&lt;/span&gt; in a job aren’t the same as those for other generations. Gen Z, for example, considers compensation less important than flexibility, career development, meaningful work, and a safe, supportive work environment.&lt;/font&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font&gt;&lt;font&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;&lt;span data-contrast="auto"&gt;&lt;font color="#4D5758"&gt;Have you heard of&lt;/font&gt; “Quiet Quitting,” “Bare Minimum Monday”, and “Time Blindness”?&amp;nbsp; These terms, and the values they represent, may at first seem incomprehensible to older generations, but leaders cannot easily dismiss this if they want to recruit and retain a thriving workforce.&amp;nbsp; Seek first to understand the different generations.&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font color="#4D5758"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font&gt;&lt;font&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;&lt;strong&gt;&lt;font color="#4D5758"&gt;Artificial Intelligence&lt;/font&gt; (AI)&lt;/strong&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:360,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font color="#4D5758"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font&gt;&lt;font&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;&lt;span data-contrast="auto"&gt;&lt;font color="#4D5758"&gt;How will AI disrupt the workplace in the next ten years? Some industries and roles will be affected more than others, and leaders will need to be ready to reskill their workforce.&lt;/font&gt;&lt;/span&gt; &lt;a href="https://www.mckinsey.com/mgi/our-research/generative-ai-and-the-future-of-work-in-america"&gt;&lt;font&gt;&lt;span data-ccp-charstyle="Hyperlink" style=""&gt;&lt;span data-contrast="none" style=""&gt;&lt;font color="#009AC6"&gt;McKinsey Global Institute&lt;/font&gt; &lt;font color="#4D5758"&gt;reports&lt;/font&gt;&lt;/span&gt;&lt;/span&gt;&lt;/font&gt;&lt;/a&gt; &lt;span data-contrast="auto"&gt;&lt;font color="#4D5758"&gt;that a&lt;/font&gt;n &lt;span data-contrast="auto"&gt;increase&amp;nbsp;&lt;/span&gt;&lt;span data-contrast="auto"&gt;in labor demand is predicted for health professionals, health technicians, and STEM Professionals (a 30% increase).&amp;nbsp; A 15-20%&lt;/span&gt; &lt;span data-contrast="auto"&gt;decrease&amp;nbsp;&lt;/span&gt;&lt;span data-contrast="auto"&gt;in labor demand is predicted for office support, customer service, and sales.&amp;nbsp; In the fields of education and workforce training, business and legal professionals, creatives, and arts management, not a large change in&lt;/span&gt; &lt;span data-contrast="auto"&gt;demand&amp;nbsp;&lt;/span&gt;&lt;span data-contrast="auto"&gt;is predicted, but a high change in&lt;/span&gt; &lt;span data-contrast="auto"&gt;work activities&lt;/span&gt;&lt;span data-contrast="auto"&gt;. “Workers in lower-wage jobs are up to 14 times more likely to need to change occupations than those in highest-wage positions, and most will need additional skills to do so successfully.”&amp;nbsp;&amp;nbsp;&lt;/span&gt; &lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font&gt;&lt;font&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;&lt;span data-contrast="auto"&gt;&lt;font color="#4D5758"&gt;These changes will not happen&lt;/font&gt; immediately, but leaders should begin preparing.&amp;nbsp; Remember this famous quote from&lt;/span&gt; &lt;a href="https://www.amazon.com/Road-Ahead-Completely-Up-Date/dp/0140260404/computerworld-20"&gt;&lt;font color="#009AC6"&gt;&lt;span data-ccp-charstyle="Hyperlink" style=""&gt;&lt;span data-contrast="none" style=""&gt;Bill Gates in 199&lt;/span&gt;&lt;span data-ccp-charstyle="Hyperlink" style=""&gt;6&lt;/span&gt;&lt;/span&gt;&lt;/font&gt;&lt;/a&gt;&lt;span data-contrast="auto"&gt;&lt;font color="#4D5758"&gt;:&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font color="#4D5758"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font&gt;&lt;font&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;&lt;span data-contrast="auto"&gt;&lt;strong&gt;&lt;font color="#4D5758"&gt;“&lt;/font&gt;We always overestimate the change that will occur in the next two years and underestimate the change that will occur in the next ten. Don’t let yourself be lulled into inaction.”&amp;nbsp;&amp;nbsp;&lt;/strong&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font color="#4D5758"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font&gt;&lt;font&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;&lt;span data-contrast="auto"&gt;&lt;font color="#4D5758"&gt;R&lt;/font&gt;eskilling your workforce is a strategic imperative and it is the responsibility of every leader and manager. Leaders will need to understand and embrace these shifts if they hope to adapt to the rapidly evolving new era of automation and AI.&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font color="#4D5758"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;&lt;font&gt;&lt;font style=""&gt;&lt;font style="font-size: 15px;"&gt;&lt;font color="#4D5758" face="Verdana" style="color: rgb(0, 0, 0);"&gt;&lt;span data-contrast="auto" style=""&gt;In conclusion, t&lt;/span&gt;echnology leaders are surely already noticing these workplace disruptions. Great leaders will acknowledge these changes and will reflect on how their personal leadership style and skills must adapt. These are the leaders who will continue to deliver results and enable their organizations to be successful in this age of ever-increasing digitization.&lt;/font&gt;&lt;font color="#4D5758" face="Verdana, sans-serif" style="color: rgb(0, 0, 0);"&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt; &lt;font color="#4D5758" face="Verdana, sans-serif" style="color: rgb(0, 0, 0); font-size: 20px;"&gt;&lt;font style="font-size: 20px;"&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/span&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13272965</link>
      <guid>https://www.technologyfirst.org/Tech-News/13272965</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Sun, 29 Oct 2023 20:25:08 GMT</pubDate>
      <title>AI for Successful Technology Teams: Steps to Achieve Excellence and Enhance the Overall Experience</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/Bill%20Magnuson%20Blog.png" alt="" title="" border="0"&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font style="font-size: 15px;"&gt;&lt;span style=""&gt;In today's fast-paced technology landscape, the integration of Artificial Intelligence (AI) has become a game-changer for businesses seeking to enhance internal and external customer experiences. For professionals well-versed in various aspects of the technology industry, understanding the simplicity of AI and the crucial steps required for success can be a significant advantage. In this blog post, we'll delve into the core concepts of AI, outline the key steps for technology teams to excel, and offer valuable tips for getting data sources right.&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font&gt;&lt;strong style="font-family: Calibri, sans-serif;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;" color="#009AC6"&gt;The Simplicity of AI&lt;/font&gt;&lt;/strong&gt;&lt;br&gt;&lt;/font&gt;&lt;span style=""&gt;&lt;font style="font-size: 15px;"&gt;Despite its reputation for complexity, AI can be simplified into its fundamental components. At its core, AI is about teaching machines to learn from data and make intelligent decisions. For our audience of technology professionals, this means understan&lt;/font&gt;ding that AI isn't magic, but a tool driven by algorithms and data.&lt;/span&gt;&lt;br&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Calibri, sans-serif" style="font-size: 15px;"&gt;&lt;strong&gt;&lt;u&gt;&lt;font color="#4D5758" face="Verdana, sans-serif"&gt;Key Components of AI:&lt;/font&gt;&lt;/u&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;blockquote&gt;
  &lt;font style="font-size: 15px;"&gt;1.&lt;font face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; &lt;strong&gt;&lt;font color="#4D5758" face="Verdana, sans-serif"&gt;Data&lt;/font&gt;&lt;/strong&gt;&lt;font color="#4D5758" face="Verdana, sans-serif"&gt;: Data is the lifeblood of AI. Accurate, relevant, and diverse data is essential for training AI models. Ensure that your data sources are comprehensive and up to date.&lt;br&gt;&lt;/font&gt;&lt;/font&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;br&gt;&lt;/font&gt;&lt;font style="font-size: 15px;"&gt;2.&lt;font face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; &lt;strong&gt;&lt;font color="#4D5758" face="Verdana, sans-serif"&gt;Algorithms&lt;/font&gt;&lt;/strong&gt;&lt;font color="#4D5758" face="Verdana, sans-serif"&gt;: Algorithms are the brains behind AI. These mathematical instructions process data and make predictions or decisions. Familiarize your team with various AI algorithms and their applications.&lt;br&gt;&lt;/font&gt;&lt;/font&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;br&gt;&lt;/font&gt;&lt;font style="font-size: 15px;"&gt;3.&lt;font face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; &lt;strong&gt;&lt;font color="#4D5758" face="Verdana, sans-serif"&gt;Model Training&lt;/font&gt;&lt;/strong&gt;&lt;font color="#4D5758" face="Verdana, sans-serif"&gt;: Training AI models involves exposing them to data to learn patterns and make predictions. It's an iterative process that requires constant refinement.&amp;nbsp; It is very important that the models being trained are consistent with your organization’s culture.&lt;br&gt;&lt;/font&gt;&lt;/font&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;br&gt;&lt;/font&gt;&lt;font style="font-size: 15px;"&gt;4.&lt;font face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; &lt;strong&gt;&lt;font color="#4D5758" face="Verdana, sans-serif"&gt;Evaluation and Testing&lt;/font&gt;&lt;/strong&gt;&lt;font color="#4D5758" face="Verdana, sans-serif"&gt;: Rigorous testing is crucial to ensure AI models perform as expected. Monitor their performance and fine-tune them as needed.&amp;nbsp; Make sure that you include your customers in the evaluation and testing process.&lt;/font&gt;&lt;/font&gt;
&lt;/blockquote&gt;&lt;strong style="font-family: Calibri, sans-serif; font-size: 15px; color: rgb(0, 154, 198);"&gt;&lt;font face="Verdana, sans-serif"&gt;Steps for Technology Teams to Succeed with AI&lt;/font&gt;&lt;/strong&gt;&lt;br&gt;

&lt;blockquote&gt;
  &lt;font style="font-size: 15px;"&gt;1.&lt;font face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; &lt;strong&gt;&lt;font color="#4D5758" face="Verdana, sans-serif"&gt;Define Clear Objectives&lt;/font&gt;&lt;/strong&gt;&lt;font color="#4D5758" face="Verdana, sans-serif"&gt;: Start by defining your AI project's objectives. What specific problem are you trying to solve, and how will AI help achieve this? Clear goals are essential.&lt;br&gt;&lt;/font&gt;&lt;/font&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;br&gt;&lt;/font&gt;&lt;font style="font-size: 15px;"&gt;2.&lt;font face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; &lt;strong&gt;&lt;font color="#4D5758" face="Verdana, sans-serif"&gt;Assemble the Right Team&lt;/font&gt;&lt;/strong&gt;&lt;font color="#4D5758" face="Verdana, sans-serif"&gt;: Form a cross-functional team with data science, software engineering, and domain knowledge expertise. Collaboration is key.&lt;br&gt;&lt;/font&gt;&lt;/font&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;br&gt;&lt;/font&gt;&lt;font style="font-size: 15px;"&gt;3.&lt;font face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; &lt;strong&gt;&lt;font color="#4D5758" face="Verdana, sans-serif"&gt;Data Quality Matters&lt;/font&gt;&lt;/strong&gt;&lt;font color="#4D5758" face="Verdana, sans-serif"&gt;: Garbage in, garbage out. Ensure your data is clean, relevant, and well-structured. Invest in data quality tools if necessary.&lt;br&gt;&lt;/font&gt;&lt;/font&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;br&gt;&lt;/font&gt;&lt;font style="font-size: 15px;"&gt;4.&lt;font face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; &lt;strong&gt;&lt;font color="#4D5758" face="Verdana, sans-serif"&gt;Choose the Right Tools&lt;/font&gt;&lt;/strong&gt;&lt;font color="#4D5758" face="Verdana, sans-serif"&gt;: Select AI frameworks, libraries, and tools that align with your project's requirements. Consider open-source options and cloud platforms.&lt;br&gt;&lt;/font&gt;&lt;/font&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;br&gt;&lt;/font&gt;&lt;font style="font-size: 15px;"&gt;5.&lt;font face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; &lt;strong&gt;&lt;font color="#4D5758" face="Verdana, sans-serif"&gt;Iterate and Improve&lt;/font&gt;&lt;/strong&gt;&lt;font color="#4D5758" face="Verdana, sans-serif"&gt;: AI is an ongoing journey. Continuously evaluate and refine your models to adapt to changing conditions and data.&lt;/font&gt;&lt;/font&gt;
&lt;/blockquote&gt;&lt;font style="font-size: 15px;"&gt;&lt;strong style="font-family: Calibri, sans-serif;"&gt;&lt;font face="Verdana, sans-serif" color="#009AC6"&gt;Tips for Getting Data Sources Right&lt;/font&gt;&lt;/strong&gt;&lt;br&gt;&lt;/font&gt;

&lt;blockquote&gt;
  &lt;font style="font-size: 15px;"&gt;1.&lt;font face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; &lt;strong&gt;&lt;font color="#4D5758" face="Verdana, sans-serif"&gt;Data Diversity&lt;/font&gt;&lt;/strong&gt;&lt;font color="#4D5758" face="Verdana, sans-serif"&gt;: Gather data from diverse sources to minimize bias and enhance model performance.&lt;br&gt;&lt;/font&gt;&lt;/font&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;br&gt;&lt;/font&gt;&lt;font style="font-size: 15px;"&gt;2.&lt;font face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; &lt;strong&gt;&lt;font color="#4D5758" face="Verdana, sans-serif"&gt;Data Governance&lt;/font&gt;&lt;/strong&gt;&lt;font color="#4D5758" face="Verdana, sans-serif"&gt;: Establish clear data governance policies to ensure data integrity, security, and compliance.&lt;br&gt;&lt;/font&gt;&lt;/font&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;br&gt;&lt;/font&gt;&lt;font style="font-size: 15px;"&gt;3.&lt;font face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; &lt;strong&gt;&lt;font color="#4D5758" face="Verdana, sans-serif"&gt;Data Preprocessing&lt;/font&gt;&lt;/strong&gt;&lt;font color="#4D5758" face="Verdana, sans-serif"&gt;: Clean, preprocess, and normalize data before feeding it to AI models to improve accuracy.&lt;br&gt;&lt;/font&gt;&lt;/font&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;br&gt;&lt;/font&gt;&lt;font style="font-size: 15px;"&gt;4.&lt;font face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; &lt;strong&gt;&lt;font color="#4D5758" face="Verdana, sans-serif"&gt;Feature Engineering&lt;/font&gt;&lt;/strong&gt;&lt;font color="#4D5758" face="Verdana, sans-serif"&gt;: Craft meaningful features from raw data to enable better model insights.&lt;br&gt;&lt;/font&gt;&lt;/font&gt;&lt;font style="font-size: 15px;"&gt;&amp;nbsp;&lt;br&gt;&lt;/font&gt;&lt;font style="font-size: 15px;"&gt;5.&lt;font face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; &lt;strong&gt;&lt;font color="#4D5758" face="Verdana, sans-serif"&gt;Data Validation&lt;/font&gt;&lt;/strong&gt;&lt;font color="#4D5758" face="Verdana, sans-serif"&gt;: Implement rigorous data validation processes to detect and rectify errors early on.&lt;/font&gt;&lt;/font&gt;
&lt;/blockquote&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#4D5758" face="Verdana, sans-serif" style="font-size: 15px;"&gt;In conclusion, AI need not be shrouded in mystery for technology professionals. By understanding its core components, following the right steps, and paying attention to data quality, your technology team can harness the power of AI to deliver exceptional internal and external customer experiences. Stay informed, collaborate effectively, and embrace the AI revolution to stay ahead in the ever-evolving technology industry.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Calibri, sans-serif" style="font-size: 15px;"&gt;&lt;strong&gt;&lt;em&gt;&lt;span style="background-color: yellow;"&gt;&lt;font color="#4D5758" face="Verdana, sans-serif"&gt;Remember, AI is not just a buzzword—it's a transformative force, and you have the knowledge and tools to leverage it effectively.&lt;/font&gt;&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#4D5758" face="Verdana, sans-serif" style="font-size: 12px;"&gt;&lt;em&gt;Bill Magnuson is the co-founder and CEO of BindMyIT, a leading technology solution consulting company. With over 26 years of experience in the tech industry, Bill is passionate about harnessing AI's potential to drive innovation and improve customer experiences.&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13272962</link>
      <guid>https://www.technologyfirst.org/Tech-News/13272962</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Sun, 29 Oct 2023 20:16:27 GMT</pubDate>
      <title>Treat Your Clients the Way You Want to Be Treated</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/Jeff%20Van%20Fleet%20Blog.png"&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;I am consulting with a client who outsourced software development for a new app. As her acting CTO, I have good insight into this relationship and the work they are doing. Let me start by saying, I am shocked by how poorly this vendor treats us. Our negative experience working with them has reminded me of the principle “treat others the way you want to be treated.”&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;The bad news is how difficult this experience has been. The good news is that it prompted me to write about how we should treat our clients, and frankly, how clients want to be treated in return. Whether you provide software services, cyber services, or plumbing services, I think you can relate to the following principles:&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;div style="margin-left: 2em"&gt;
  &lt;ul&gt;
    &lt;li&gt;&lt;font style="font-size: 14px;"&gt;Set clear expectations – If you are a software shop and you say that you do Agile development, then explain what your definition of Agile is. Clearly explain your process, especially where and how you will engage the client, so they know what to expect (and what you expect from them in return). If you say you’re an Agile shop, then it should be pretty close to the Agile Manifesto. It most certainly should involve the customer/product owner setting priorities, having short sprints/delivery cycles, and frequent feedback/retrospectives. The main objective is to get feedback from the client early and often and adjust frequently. EXPLAIN YOUR PROCESS.&amp;nbsp;&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;div style="margin-left: 2em"&gt;
  &lt;ul&gt;
    &lt;li&gt;&lt;font style="font-size: 14px;"&gt;Communicate frequently, both good and bad – It’s always easy to communicate good news. “Hey, we’re ahead of schedule,” or “That went smoother than we thought it might.” But it’s crucial to deliver the not-so-great news. “It didn’t go as easily as we expected,” or “We just lost our senior developer.” When we have a problem, we all think that we can hide it and fix it without the client ever knowing. That might work some of the time, but your team knows what you did, and you just caused them to lie about what they got done during the sprint.&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;font style="font-size: 14px;"&gt;Meet with your client frequently. We recommend weekly. If you have two-week sprints, each week can alternate between a user story/requirements grooming session and a post-sprint retrospective. Use your grooming session to build rapport and understanding with your client and use the retrospective to share what you got done. Be open. Share what you planned to get done vs. what actually got done and have an open dialog about why.&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

  &lt;p&gt;&lt;font style="font-size: 14px;"&gt;Maybe you were too optimistic when you estimated the story points. Maybe you and your client didn’t do a great job grooming a particularly complex requirement. Maybe your testers uncovered a bunch of unexpected bugs. That’s a good thing. You’d rather find them now than later. Maybe two of your team members got sick. Who knows? But the point is to work together, develop lessons learned, learn the lessons, improve, and avoid repeating the same mistakes over and over. SHARE OPENLY.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;div style="margin-left: 2em"&gt;
  &lt;ul&gt;
    &lt;li&gt;&lt;font style="font-size: 14px;"&gt;Set and meet intermediate milestones – If you are running an Agile shop, this is easy. Set a sprint schedule and hold to it. Most organizations we work with use two-week sprints, and a critical key to success is to hold these dates rock solid.&amp;nbsp; Don’t let the work cause you to slide the date! Another critical key to success is assuring you FULLY complete the work in the sprint. Not all the work you planned needs to be completed, but the work you say got done, must actually be done.&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;blockquote&gt;
  &lt;font style="font-size: 14px;"&gt;To achieve this, we recommend you set an immutable, unbreakable definition for Done-Done – This definition cannot be gray because if it is, then … Every feature. In every sprint. Is going to be questioned. Forever.&amp;nbsp;Make it easy and clear to your team, your client, and your stakeholders. For us, the ideal definition of “Done-Done” is that you completed both the development and testing for a feature. Ideally, all bugs are fixed, but at a minimum, all critical and majors are corrected, and any minors or trivials are documented in Jira. DO NOT EQUIVOCATE.&lt;/font&gt;
&lt;/blockquote&gt;

&lt;div style="margin-left: 2em"&gt;
  &lt;ul&gt;
    &lt;li&gt;&lt;font style="font-size: 14px;"&gt;Ensure the customer always has full control of their assets – Go through the process in the beginning of having your customer setup and be the administrator of GitHub, servers, database, and all other tools. Even though they might not have this skillset, you want them to know that they always have full control of everything they envisioned and paid for. Empower them so they can go elsewhere if they want. If you are open and honest and constantly improving, they won’t want to.NEVER HOLD THE CODE AS RANSOM.&amp;nbsp;&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;div style="margin-left: 2em"&gt;
  &lt;ul&gt;
    &lt;li&gt;&lt;font style="font-size: 14px;"&gt;Report progress against a plan – Customers rightfully want to know how long the project will take and how much it will cost. Build a plan and size the project up front. Show them your past productivity on similar projects so they can understand when you think it will be done. Ideally, share cost, schedule, and quality metrics vs. plan with your customer at each retrospective. Track and report your velocity every sprint so you can give them (and your team) confidence in hitting the deadlines. Are you delivering the expected story points/sprint? Are you finding more or less bugs each sprint? How much effort is going toward new features vs. bug fixes? Does the backlog estimate align with your velocity and meet your expected delivery date and budget? Do you have a management reserve built into your estimates? Collecting and communicating this information allows you to improve and provide your customers with ever-growing confidence in you. YOU CAN’T MANAGE WHAT YOU DON’T MEASURE.&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;div style="margin-left: 2em"&gt;
  &lt;ul&gt;
    &lt;li&gt;&lt;font style="font-size: 14px;"&gt;Be honest and kind – If you mess up, own it, and fix it. Don’t try to hide things because it’s always a bad situation when the truth comes out. I think we all learned that lesson in kindergarten. And don’t charge the customer for your mistakes, training, or lack of experience. Be positive and kind in your communications even if you don’t agree with your customer. Explain why your opinion is different and have a dialog. Put yourself on the same side of the table as the customer and realize that you are both trying to successfully deliver this app. I know there are some less than reputable companies, but I think the vast majority of software shops want to deliver successful apps and want happy client references. TREAT YOUR CLIENT THE WAY YOU WANT TO BE TREATED.&amp;nbsp;&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;I wrote this talking directly to software development companies, but it’s easy enough to flip the script and read these as the expectations you should have when buying software services. If you are in the market for a software development partner or have found yourself in a frustrating situation with one who isn’t performing where you want them to be, ask yourself how you want to be treated. Then, use your answers and the guide above to find a qualified partner who not only aligns with your needs as a company and client, but as a person.&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;We’d love to hear from you! Do these resonate with you? What have your experiences been? Please share your personal experiences so we can all learn and improve.&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;Jeff Van Fleet&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;President &amp;amp; CEO, Lighthouse Technologies, Inc.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;After almost 20 years of developing and managing complex software/hardware systems for both commercial and Department of Defense (DoD) applications, Jeff founded Lighthouse Technologies in 2000 with the aim of delivering software systems on-time, on-budget, and on-quality while simultaneously building an intentional culture of caring, growing, and improving – A “Culture of We”.&amp;nbsp;&lt;/font&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13272959</link>
      <guid>https://www.technologyfirst.org/Tech-News/13272959</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Fri, 29 Sep 2023 15:18:15 GMT</pubDate>
      <title>NIST Makes Changes to their Cybersecurity Framework</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/Marcus%20Thompson.png" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;&lt;strong&gt;The NIST Cybersecurity Framework&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;" align="left"&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;NIST, the US National Institute of Standards and Technology, has released a new draft version of its&lt;/font&gt; &lt;a href="https://www.nist.gov/cyberframework" target="_blank"&gt;&lt;font style="font-size: 15px;" face="Verdana"&gt;&lt;font color="#009AC6"&gt;Cybersecurity Framework&lt;/font&gt;&lt;/font&gt;&lt;/a&gt; &lt;font face="Verdana" style="font-size: 15px;"&gt;(CSF).&amp;nbsp; This 2.0 version of the voluntary Framework is the first refresh to the current 1.1 version released in 2018.&amp;nbsp;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;div align="center"&gt;
  &lt;font face="Verdana" style="font-size: 15px;"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/NIST%20Cyber%20Framework.png" alt="" title="" border="0" width="201" height="193"&gt;&lt;/font&gt;
&lt;/div&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;NIST, the US National Institute of Standards and Technology, has released a new draft version of its&lt;/font&gt; &lt;a href="https://www.nist.gov/cyberframework" target="_blank"&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;&lt;font color="#009AC6"&gt;&lt;font&gt;Cybersecurity Framework&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/a&gt; &lt;font face="Verdana" style="font-size: 15px;"&gt;(CSF).&amp;nbsp; This 2.0 version of the voluntary Framework is the first refresh to the current 1.1 version released in 2018.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;At a high level, the CSF is a set of guidelines intended to help organizations improve their cybersecurity practices and effectively manage their cybersecurity risks.&amp;nbsp; By following the Framework, organizations can enhance their overall cybersecurity posture, minimize cybersecurity risks, and safeguard critical assets and data.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;The Framework Core is a set of cybersecurity outcomes which are arranged by function, category, and subcategory.&amp;nbsp; It also includes examples of how those outcomes might be achieved by providing implementation examples and references to additional guidance.&amp;nbsp; It’s not a checklist to follow because the actions needed to achieve a cybersecurity outcome will differ by organization and use case.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;&lt;strong&gt;Changes to the Cybersecurity Framework&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;&lt;em&gt;Expanded Scope&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;The scope of the Framework has been expanded.&amp;nbsp; The CSF was initially developed with the focus of protecting critical infrastructure such as banking and energy industries, but the Framework has been useful in other sectors from small businesses, education, to local governments.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;&lt;em&gt;Expanded Implementation Guidance&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;The updated version provides improved and expanded guidance on the implementation of the CSF.&amp;nbsp; The use of &lt;a href="https://www.nist.gov/cyberframework/examples-framework-profiles" target="_blank"&gt;&lt;font&gt;Framework Profiles&lt;/font&gt;&lt;/a&gt; tailors the CSF for specific use case scenarios.&amp;nbsp; Examples of Profiles include a specific scenario such as “How to Use the Cybersecurity Framework Profile for Connected Vehicle Environments,” or a more general topic of “Ransomware Risk Management.”&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;The Framework will also now include implementation examples for each of the function’s subcategories to help organizations use the framework more effectively.&amp;nbsp; These examples are not contained in the main framework document but will be maintained separately in an online format called the NIST&lt;/font&gt; &lt;a href="https://csrc.nist.gov/Projects/cprt" target="_blank"&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;&lt;font color="#009AC6"&gt;Cybersecurity and Privacy Reference Tool&lt;/font&gt;&lt;/font&gt;&lt;/a&gt; &lt;font face="Verdana" style="font-size: 15px;"&gt;(CPRT).&amp;nbsp; This will allow for more frequent updates to keep information current.&amp;nbsp; This tool is currently in Phase 1 of its development and will be expanded as it matures.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;&lt;em&gt;New Pillar&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;The CSF has added a new pillar to the previous five main functions of identify, protect, detect, respond, and recover.&amp;nbsp; The sixth pillar that was added is the Govern function.&amp;nbsp; The new pillar focuses on the establishment and monitoring of the organization’s cybersecurity risk management strategy, expectations, and policy.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;The Govern function isn’t an entirely new topic in the CSF.&amp;nbsp; 17 of the 31 subcategory items in the Govern function have been moved from one of the other five functions.&amp;nbsp; In addition to new subcategories being added an entirely new category was added related to Oversight.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;&lt;font style="font-size: 15px;"&gt;One new focus is the emphasis on organizational leadership bearing responsibility and accountability for cybersecurity risk and an organizational culture that is risk-aware, ethical, and continually improving.&amp;nbsp; It shows cybersecurity isn’t just a function of IT but rather needs to be a part of the organization’s overall governance and strategic planning.&lt;/font&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;The changes to the new (draft) version of the NIST CSF bring an expanded scope to include more than just “critical infrastructure” sectors.&amp;nbsp; Framework Profiles / use cases help to tailor the Framework to organizational and sector goals.&amp;nbsp; Implementation guidance for each of the Function’s subcategories helps organizations to use the framework more effectively.&amp;nbsp; Finally, the addition of the sixth pillar of Govern shows the importance of the integration of cybersecurity into overall business strategy and oversight.&lt;/font&gt;&lt;/p&gt;

&lt;p class="contStyleSmaller"&gt;&lt;font style="font-size: 12px;" face="Verdana"&gt;&lt;em&gt;Marcus Thompson is the Founder and CEO of Expedient Technology Solutions, LLC, located in Miamisburg, OH.&amp;nbsp; ETS is a cybersecurity-focused managed services provider bringing technology and cybersecurity solutions to area organizations.&amp;nbsp; Marcus holds many cybersecurity certifications including the Certified Information Systems Security Professional (CISSP) and Certified Information Security Manager (CISM).&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13260971</link>
      <guid>https://www.technologyfirst.org/Tech-News/13260971</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Mon, 04 Sep 2023 16:18:54 GMT</pubDate>
      <title>The Future State of Artificial Intelligence in The Workforce</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/Trevor%20Cobain.png" alt="" title="" border="0"&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;As organizations rapidly deploy generative Artificial Intelligence (AI) tools,&lt;/font&gt; &lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;many companies expect significant effects on their industries and workforces.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;The latest&lt;/font&gt; &lt;a href="https://www.mckinsey.com/capabilities/quantumblack/our-insights/the-state-of-ai-in-2023-generative-ais-breakout-year" target="_blank"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;&lt;font color="#0563C1"&gt;annual McKinsey Global Survey&lt;/font&gt;&lt;/font&gt;&lt;/a&gt; &lt;font face="Verdana" style="font-size: 14px;"&gt;on the current state of AI confirms the explosive growth of generative AI (gen AI) tools. Less than a year after many of these tools debuted, one-third of the McKinsey survey respondents say their organizations are using gen AI regularly in at least one business function. Amid recent advances, AI has risen from a topic relegated to tech employees to a focus of company leaders: nearly one-quarter of surveyed C-suite executives say they are personally using gen AI tools for work, and more than one-quarter of respondents from companies using AI say gen AI is already on their boards’ agendas.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;What’s more, 40% of respondents say their organizations will increase their investment in AI overall because of advances in gen AI. The findings show that these are still early days for managing gen AI–related risks, with less than half of respondents reporting that their organizations are mitigating even the risk they consider most relevant: inaccuracy.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/Picture1%20Medium.jpeg" alt="" title="" border="0" width="574" height="499"&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" face="Calibri, sans-serif" style="font-size: 14px;"&gt;&lt;a href="https://www.brookings.edu/people/darrell-m-west/" target="_blank"&gt;&lt;font color="#0563C1"&gt;Darrell West&lt;/font&gt;&lt;/a&gt;,&lt;/font&gt; &lt;font face="Verdana" style="font-size: 14px;"&gt;Senior Fellow, Governance Studies at the Brookings Institution, states that AI is likely to flatten many organizations due to its ability to automate work activities. Right now, most organizations have entry-level people who perform routine tasks, midlevel individuals who supervise them, and high-level employees who set the direction of the organization.&amp;nbsp; That organizational structure will no longer be necessary. AI can automate many of the tasks performed by entry-level workers. Accounting features, purchase orders, and job requisitions are already being automated. Workplaces no longer need people who manually compile or analyze information.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;As generative AI becomes more widely deployed, even more tasks will be automated. In addition,&amp;nbsp;&lt;/font&gt;&lt;span&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;job supervision and assessment won’t need as much human oversight. Customers can rate employees on how well they perform basic tasks and allow people to get the services they want. Using data analytics and AI, companies can use the responses to weed out low-performing workers and reward their top individuals. The end result will be fewer layers of management and a smaller number of employees overall in the organization.&lt;/font&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;span&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/Picture2%20Medium.jpeg" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/font&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" face="Calibri, sans-serif" style="font-size: 15px;"&gt;Image Source: &lt;a href="https://www.mckinsey.com/capabilities/quantumblack/our-insights/the-state-of-ai-in-2023-generative-ais-breakout-year" target="_blank"&gt;&lt;font color="#0563C1"&gt;McKinsey Global Survey on the current state of AI&lt;/font&gt;&lt;/a&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" face="Calibri, sans-serif" style="font-size: 14px;"&gt;&lt;a href="https://www.mckinsey.com/our-people/michael-chui" target="_blank"&gt;&lt;font color="#0563C1"&gt;Michael Chui&lt;/font&gt;&lt;/a&gt;,&lt;/font&gt; &lt;font face="Verdana" style="font-size: 14px;"&gt;Partner, McKinsey Global Institute, states that there are some gen AI applications where the potential to have transformative impact really comes to the fore. For example, in research and development, some experiments using generative AI to support writing software code have shown very high levels of increasing productivity. But that doesn’t mean we’ll need a lot fewer software engineers, because the world needs more software. Generative AI also has the potential for improving the productivity of contact centers. Technologies that automate interactions with customers already exist. Generative AI has the potential for making these interactions feel much more natural.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" face="Calibri, sans-serif"&gt;&lt;font style="font-size: 14px;"&gt;&lt;a href="https://www.alexandrasamuel.com/" target="_blank"&gt;&lt;font color="#0563C1"&gt;Alexandra Samuel&lt;/font&gt;&lt;/a&gt;,&lt;/font&gt;&lt;/font&gt; &lt;font&gt;&lt;font face="Verdana"&gt;&lt;font&gt;&lt;font style="font-size: 14px;"&gt;digital-workplace speaker and co-author of&lt;/font&gt;&lt;/font&gt;&lt;/font&gt; &lt;a href="https://www.amazon.com/Remote-Inc-Thrive-Work-Wherever/dp/0063079372" style="color: rgb(0, 0, 0);" target="_blank"&gt;&lt;font&gt;&lt;font color="#0563C1" style="font-size: 14px;"&gt;“Remote, Inc.”&lt;/font&gt;&lt;/font&gt;&lt;/a&gt; &lt;font face="Verdana" style="font-size: 14px;"&gt;states that as AI takes over routine tasks, there will be a temptation to cut the whole tier of entry-level employees. Summarizing documents, answering routine emails, writing basic computer code, and solving simple logistical challenges are all tasks that AIs can do about as well as an inexperienced human, and at much lower cost. But employers still need an on ramp for new hires. If you stop hiring entry-level employees,&amp;nbsp;&lt;/font&gt;&lt;/font&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;span&gt;you’ll have to do all your midlevel hiring from outside the organization. And if every&amp;nbsp;&lt;/span&gt;&lt;span&gt;organization pares back on entry-level hires; it will get harder and harder to find experienced&amp;nbsp;&lt;/span&gt;&lt;span&gt;mid career talent anywhere.&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;font&gt;That’s why it pays to cultivate your own long-term talent pool by hiring green employees, but&amp;nbsp;&lt;/font&gt;&lt;span&gt;rethinking how they are tasked and trained. Instead of piling your juniors with grunt work and&amp;nbsp;&lt;/span&gt;&lt;span&gt;trusting that they’ll learn through observation, assign them more challenging tasks, like drafting reports instead of just summarizing them. The explosion in AI research and writing tools means that kind of work is now well within the grasp of inexperienced hires. With more active coaching and mentoring, these green employees can grow into valuable colleagues, much more quickly.&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p align="center" style="line-height: 16px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 15px;"&gt;###&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 12px;"&gt;Trevor Cobain is the&amp;nbsp;&lt;span style="background-color: rgb(255, 255, 255);"&gt;&lt;font&gt;Senior Business Development Manager for Alta IT Services. He has over 20 years experience providing&amp;nbsp;&lt;span style=""&gt;&lt;font style=""&gt;niche talent ​opportunities to his clients.&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13249913</link>
      <guid>https://www.technologyfirst.org/Tech-News/13249913</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Mon, 21 Aug 2023 19:31:28 GMT</pubDate>
      <title>How Do You OWN IT?</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Newsletter/Tech%20News%20Blog%20OWN%20IT.png" alt="" title="" border="0"&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;For the first time in Technology First history, we are hosting a &lt;a href="https://www.technologyfirst.org/event-5341382" target="_blank" style=""&gt;women’s conference&lt;/a&gt;. We are thrilled to bring this half day event to the Women 4 Technology community! The theme for this year’s conference is Own IT! As you can imagine, we’ve had several conversations over what Own IT means, and I was surprised by the variety of viewpoints.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;For me, Own IT means:&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;Owning who I am, knowing my values, understanding my strengths, owning my personality type, and setting, and sticking to, my boundaries. It’s so important to be both confident in who we are and really owning who we are. I remember a time when I wished that I was five feet tall and weighed 100 pounds. It simply isn’t the way I’m built and today I’m okay with that.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;Over the years I’ve taken a plethora of values tests and they pretty much stay the same: collaboration, honesty, trust, contribution, and participation to name a few. Knowing my values helps me stay aligned with what really matters, how I decide to spend my time and with who. If you haven’t taken a values test here is a pdf to get you started.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;Several years ago, I read &lt;em&gt;Strength Finders 2.0&lt;/em&gt; by Tom Rath. It’s a quick read and then a quick online test. The feedback I received was invaluable! I learned my top strengths are achiever, learner, responsibility, deliberative and relator. Knowing this has helped me know where and how to best spend my time. I surround myself with people that have different strengths because together we make a great team!&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;Knowing my personality type has also clarified how I communicate and how I process. If you are familiar with Myers-Briggs, or MBTI, I’m INTJ: introvert, intuitive, thinking, judging. I know, introvert, me?! This one really helped me understand the reason I’m exhausted after a day of meetings and networking.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;Boundaries! Man, these are tough! As I get older, I’m better at them but then there are times I think I can conquer everything, volunteer for everything, and do everything. Setting boundaries has become both necessary and a way to ensure I work on some sort of work/life harmony.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;Owning IT also means, to me, taking responsibility for my actions and my team. Ensuring that my expectations are clearly communicated, and that we are all on the same page. If something fails, it’s my fault and my job to find out what I need to do to fix it. What processes and/or procedures need to be reviewed, reevaluated, and/or created to ensure it doesn’t fail again? It’s when I mess up and take responsibility, owning my actions, or lack of action.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;So, I ask you, what does Own IT mean to you? Join us on Wednesday, September 27&lt;sup style=""&gt;th&lt;/sup&gt; and share your point of view!&lt;/font&gt;&lt;/p&gt;

&lt;p align="center"&gt;*********&lt;/p&gt;

&lt;p align="left"&gt;&lt;font style="font-size: 12px;"&gt;Melissa Cutcher is Executive Director of Technology First.&lt;/font&gt;&lt;font style="font-size: 14px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13243736</link>
      <guid>https://www.technologyfirst.org/Tech-News/13243736</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Wed, 26 Jul 2023 19:23:08 GMT</pubDate>
      <title>Eat, or Be Eaten: The Importance of ITAM in Merger &amp; Acquisition Activities</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/Jeremy%20Boerger%20Tech%20News%20Blog.jpg" alt="" title="" border="0"&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Verdana" style="font-size: 15px;"&gt;It is one thing to grow a business through organically increasing market share through advertising and selling.&amp;nbsp; It is another thing to grow by gobbling up (or being gobbled up by) your competition.&amp;nbsp; The level of unmitigated chaos created by welding two different companies, with separate cultures, practices, and methodologies cannot be underestimated.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Verdana" style="font-size: 15px;"&gt;Unfortunately, some of this pain and suffering is self-inflicted, especially within the Information Technology (IT) department.&amp;nbsp; Their job is to provide the electronic tools and talents necessary for modern businesses to do their business.&amp;nbsp; That is why IT takes up such a large chunk of the overall budget.&amp;nbsp; That is also why IT is a prime target for redundancy elimination when the two companies finally become one.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Verdana" style="font-size: 15px;"&gt;Why is it, then, that IT Asset Management (ITAM) is rarely ever mentioned, if at all, as part of the merger and acquisition (M&amp;amp;A) process?&amp;nbsp; ITAM’s purpose is to achieve cost optimization of the hardware and software spend across the entirety of those assets’ useful life.&amp;nbsp; Maybe it is because ITAM works behind the scenes and their impact is overlooked.&amp;nbsp; Maybe your own ITAM program’s reporting accuracy has a poor reputation.&amp;nbsp; Maybe the organization hasn’t prioritized ITAM tooling and training to ensure they are ready for the extra workload an M&amp;amp;A will bring.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Verdana" style="font-size: 15px;"&gt;Regardless of the reasons for past mistakes, let’s examine some ways you can avoid ITAM issues in future M&amp;amp;As:&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Verdana" style="font-size: 15px;"&gt;1.&lt;font style="font-size: 9px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; &lt;strong&gt;Get Your ITAM Team Involved Right Away -&lt;/strong&gt; The sooner your team knows about the company &lt;font&gt;’&lt;/font&gt;s plans and understands they will be front and center, the better. Don &lt;font&gt;’&lt;/font&gt;t wait for them to hear about it somewhere else. The last thing you want is for them to panic.&amp;nbsp; Give them time to find and review their own tooling and knowledge gaps. This increases their chance for a successful outcome.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Verdana" style="font-size: 15px;"&gt;2.&lt;font style="font-size: 9px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; &lt;strong&gt;Help IT Security, IT Service&lt;/strong&gt; &lt;strong&gt;Management, and ITAM Work Together -&lt;/strong&gt; Cybersecurity and Service Management are usually top of mind. They are your go-to teams for surveying the acquired company’s technology stack.&amp;nbsp; Adding ITAM provides a third, complimentary vision into the workings of the acquisitions IT operations. This can ensure all three teams have accurate and trustworthy reporting on any expensive services, vulnerabilities, or license audit risks.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Verdana" style="font-size: 15px;"&gt;3.&lt;font style="font-size: 9px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; &lt;strong&gt;Understand You&lt;/strong&gt; &lt;strong&gt;&lt;font&gt;’&lt;/font&gt;ll Run Two ITAM Teams For A While -&lt;/strong&gt; Each company &lt;font&gt;’&lt;/font&gt;s asset records and configuration items must be kept separate from each other until the combined group &lt;font&gt;’&lt;/font&gt;s service and license agreements are renegotiated.&amp;nbsp; That means two configuration management databases (CMDBs) or managed data repositories (MDRs).&amp;nbsp; Resist the urge to just smash the two systems together and hope for the best.&amp;nbsp; Allow ITAM the chance to dig through old records, determine their validity, and ingest only the valid ones.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Verdana" style="font-size: 15px;"&gt;4.&lt;font style="font-size: 9px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; &lt;strong&gt;Control How Much Software Publishers &amp;amp; Service Providers Know About The M&amp;amp;A -&lt;/strong&gt; Software auditors examine trade publications and press releases every day and delight in scheduling license audits at the most inopportune times for you. You and your ITAM team need to be ready for an audit notification the second your M&amp;amp;A plans go public. Have your audit defense playbook ready!&amp;nbsp; And if you don’t have one?&amp;nbsp; Well…&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Verdana" style="font-size: 15px;"&gt;5.&lt;font style="font-size: 9px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; &lt;strong&gt;Don&lt;/strong&gt; &lt;strong&gt;&lt;font&gt;’&lt;/font&gt;t Hesitate To Bring In Outside Help -&lt;/strong&gt; Software publishers routinely bring in third-party software auditors to help them conduct their investigations.&amp;nbsp; Third-party cybersecurity firms can provide experience and talent for the short-term needs the merging companies might lack.&amp;nbsp; And some managed service providers specialize in providing temporary contractors to cover spiking IT support demands.&amp;nbsp; I can assure you, there are specialized ITAM firms that can provide cost-effective and customized hardware and software licensing support until the merger completes.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Verdana" style="font-size: 15px;"&gt;M&amp;amp;As (and Divestitures, for that matter) can be exciting events.&amp;nbsp; They don’t happen that often, like field trips and pizza parties when you were a kid.&amp;nbsp; And that means your IT department could lack the experience necessary to ensure the smooth creation of the new organization.&amp;nbsp; Just remember: your IT Asset Management team can help mitigate these issues, but only if they are brought in early enough to successfully apply their best business practices.&lt;/font&gt;&lt;/p&gt;

&lt;p align="center"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 15px;"&gt;**********&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;Jeremy L. Boerger, the ITAM Coach, founded BOERGER CONSULTING with the idea of helping organizations &lt;font style=""&gt;“&lt;/font&gt;cut their software budget without buying less software”.&amp;nbsp;&amp;nbsp;He also speaks around the country to pass along his 20+ years &lt;font style=""&gt;’&lt;/font&gt; experience to the next generation of ITAM and SAM professionals.&amp;nbsp;&amp;nbsp;His book, &lt;font style=""&gt;“&lt;/font&gt;Rethinking Information Technology Asset Management,” is available at Amazon, Barnes &amp;amp; Nobel, and most other bookstores.&lt;/font&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13232666</link>
      <guid>https://www.technologyfirst.org/Tech-News/13232666</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Mon, 03 Jul 2023 14:02:37 GMT</pubDate>
      <title>Keys to Successful Digital Transformation</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/Tech%20News%20Blog.png" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li style="list-style: none; display: inline"&gt;
    &lt;p&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;font&gt;Every business is unique, so the specific blueprint to successful digital transformation varies. You will achieve your desired results if you tailor your approach to your organization's needs, industry, and market conditions. Here are some factors to consider.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;p&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;font color="#009AC6"&gt;&lt;strong&gt;Evaluate Current Strategy&lt;/strong&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li style="list-style: none; display: inline"&gt;
    &lt;ul&gt;
      &lt;li&gt;&lt;span style=""&gt;&lt;font style="font-size: 14px;"&gt;Target your investments: Companies spend big on digital transformation. Spend wisely. Prioritize security and privacy throughout your digital transformation efforts. Implement robust cybersecurity measures to protect your data, systems, and customer information. Ensure compliance with relevant regulations and standards. Technology is a key component, but you must invest in your people, processes, and customers.&lt;/font&gt;&lt;/span&gt;&lt;/li&gt;
    &lt;/ul&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;div style="margin-left: 2em"&gt;
  &lt;ul&gt;
    &lt;li&gt;&lt;font style="font-size: 14px;"&gt;Prioritize the business: Invest in a modern and scalable technology infrastructure that supports your digital initiatives. This may involve adopting cloud computing and integrating various software applications and systems. Technology stacks are evolving at a rapid rate, which causes businesses to want to chase after the next best thing. Always have the business at the heart of the transformation. Ensure it makes sense as it will ultimately have a wide effect on the business and is worth pursuing.&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;ul&gt;
  &lt;li style="list-style: none; display: inline"&gt;
    &lt;ul&gt;
      &lt;li&gt;&lt;font style="font-size: 14px;"&gt;Engage your workforce: Foster an agile and adaptive culture within your organization. Encourage innovation, experimentation, and a willingness to take calculated risks. Embrace new technologies, encourage collaboration, and empower employees to contribute ideas and drive change. Get input from your employees and seek out their perspective. They are performing current processes daily and can speak about them from firsthand experience.&lt;/font&gt;&lt;/li&gt;
    &lt;/ul&gt;
  &lt;/li&gt;

  &lt;li style="list-style: none; display: inline"&gt;
    &lt;p&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;font color="#009AC6"&gt;&lt;strong&gt;Put People First&lt;/strong&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li style="list-style: none; display: inline"&gt;
    &lt;ul&gt;
      &lt;li&gt;&lt;span style=""&gt;&lt;font style="font-size: 14px;"&gt;Focus on the customer: Ultimately, digital transformation is about exceptional user experiences. Prioritize your customers throughout the transformation process. Gain a deep understanding of their needs, preferences, and pain points. Use this knowledge to design digital solutions that enhance their experience and deliver value. Map out your entire customer journey. It will provide a clear roadmap to help you build engaging customer experiences for your target audience.&lt;/font&gt;&lt;/span&gt;&lt;/li&gt;
    &lt;/ul&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;div style="margin-left: 2em"&gt;
  &lt;ul&gt;
    &lt;li&gt;&lt;font style="font-size: 14px;"&gt;Make it a collective effort: Ensure you have the right talent and skills within your organization to drive digital transformation. Identify skill gaps and provide training and development opportunities for your employees. Transformation can’t succeed in a silo. Business and IT teams must get on the same page, communicate, and create a shared vision before moving digital transformation strategies forward.&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;Be mindful with leadership: Choose leaders and representatives wisely to gauge the organization as a whole and help build a culture of learning and sharing to support business transformation.&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;ul&gt;
  &lt;li style="list-style: none; display: inline"&gt;
    &lt;p&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;font color="#009AC6"&gt;&lt;strong&gt;Set Clear Expectations&lt;/strong&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li style="list-style: none; display: inline"&gt;
    &lt;ul&gt;
      &lt;li&gt;&lt;span style=""&gt;&lt;font style="font-size: 14px;"&gt;Start with the end in mind: Define a clear vision for your digital transformation and establish a strategy that aligns with your business goals. Determine what you want to achieve, whether it's improving operational efficiency, enhancing customer experience, or exploring new business models. Starting with a plan and building a roadmap will help you construct operational value streams and enablement runways. They will serve as the foundation for achieving true business and delivery agility.&lt;/font&gt;&lt;/span&gt;&lt;/li&gt;
    &lt;/ul&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;div style="margin-left: 2em"&gt;
  &lt;ul&gt;
    &lt;li&gt;&lt;span style=""&gt;&lt;font style="font-size: 14px;"&gt;Embrace disruption: Digital transformation requires strong leadership and effective change management. Engage key stakeholders, communicate the vision, and create a culture that embraces change. Leadership should inspire and drive the transformation, ensuring everyone understands the importance of digital initiatives. Whether environmental, geopolitical, technological or a public health crisis, the next disruption is coming. Create flexibility and resiliency within your company, so you do more than weather the storm. You grow, innovate, and thrive through it.&lt;/font&gt;&lt;/span&gt;&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;div style="margin-left: 2em"&gt;
  &lt;ul&gt;
    &lt;li&gt;&lt;span style=""&gt;&lt;font style="font-size: 14px;"&gt;Define the business outcomes: Leverage data and analytics to make informed business decisions. Implement robust data collection, storage, and analysis processes. Extract insights from data to drive improvements, optimize processes, and identify new opportunities. Remember, no business initiative can thrive without being rooted in a quantifiable outcome that has an impact and meaning for the organization. It all starts with the unifying force of having tangible goals. Where do you want to go and how will you get there?&lt;/font&gt;&lt;/span&gt;&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;font&gt;Digital transformation is an ongoing process. Continuously monitor and evaluate the effectiveness of your initiatives. If you embrace a culture of continuous improvement, iterate on your digital solutions, and adapt to changing market conditions and customer needs, then your business’s digital transformation will be successful.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;font&gt;&lt;a href="https://www.teksystems.com/en/" target="_blank"&gt;TekSystems&lt;/a&gt;&amp;nbsp;&lt;font&gt;brings real-world expertise to solve your complex technology, business and talent challenges on a global scale.&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.teksystems.com/en/insights/state-of-digital-transformation-2023#transforming-business-with-technology" target="_blank"&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;font&gt;Read The Full Article Here&amp;nbsp;&lt;/font&gt;&lt;/font&gt;&lt;/a&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13223002</link>
      <guid>https://www.technologyfirst.org/Tech-News/13223002</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Wed, 31 May 2023 12:39:08 GMT</pubDate>
      <title>Dashboards Are Just the Tip of the Iceberg</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/Salem%20Alsulaiman.jpg" alt="" title="" border="0"&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;“Without data, you’re just another person with an opinion,” business management expert W. Edwards Deming once said.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;Well, how can you get “data” to go from an “opinion” to an insight and build a strong business entity that can sustain fierce competition and an unpredictable future? The answer is simple “IF” it is done right:&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 14px;" color="#099AC6"&gt;&lt;strong&gt;Invest in Business Intelligence (BI) solutions that are scalable and have an enterprise mindset. &amp;nbsp;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;One of the most common approaches to selecting and implementing a BI solution is when a CIO or top-level IT leader sees a demo of (fill in the blank BI tool…). They love it so much, they think ‘we just need to get it done!’ But wait, what about the backend part of this tool? Did the demo show how the data is curated? Did they show how scalable the data models are? The answer is:&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;‘We just need to figure out how to make it work!’&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;That is where BI engineers and consultants come in. Thinking only about the dashboard and not the backend at the beginning is an expensive approach and leads to frustrating implementation. Sometimes, you end up with both the new BI tool and the one you are trying to replace because the shiny new one is not working as well as hoped.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;Having a user-friendly BI dashboarding tool is an important part of data analytics. However, more important than the dashboard is the data model and how scalable it is, so an organization can build it once and EVERYONE can use it in any dashboard they build.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;A scalable enterprise semantic layer makes BI developers’ and analysts’ jobs a lot easier, and it is one of the factors of achieving BI implementation with “one source of the truth.” A smart business analyst that knows how to build a top-class dashboard does not necessarily know how create a data model, but having the enterprise semantic layer will eliminate that gap. Hence, data modelers are expensive for a reason, but that can be overcome with a build-it-once approach that does not require data analysts to also be data modeling experts.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;Here is a common example: There are two dashboards representing an amount figure, (ex. last quarter’s sales) but they show two different values. After a long investigation, you end up with a third different value so the insights become three different “opinions.” The hardest part of this example is trying to explain to the leaders why enterprise data models are important so the analysts do not make the wrong tables join and show incorrect data that might have a consequential outcome.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;In conclusion, most people can build a dashboard with little to no training if the data is coming from one table or an Excel file. However, to be an analytical savvy business, it is critical to invest in BI solutions that have built-in scalable enterprise semantic layers so there is “one source of the truth.”&lt;/font&gt;&lt;/p&gt;

&lt;p align="center"&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;*****&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;em&gt;Salem Alsulaiman is a Business Intelligence Engineer and Technology First’s Data Analytics Peer Group Chair. He has more than 10 years’ experience in the Business Intelligence (BI) and data analytics space, implementing end-to-end BI solutions.&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13208534</link>
      <guid>https://www.technologyfirst.org/Tech-News/13208534</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Wed, 31 May 2023 12:29:29 GMT</pubDate>
      <title>What Habits Are Holding You Back?</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/Nancy%20Percy.jpg" alt="" title="" border="0"&gt;&lt;/p&gt;

&lt;p style="display: inline !important;"&gt;&lt;font style="font-size: 14px;"&gt;People pleaser… Perfectionist… Being modest about your achievements… Failing to enlist others or finding your promotor… Does this sound familiar to you? Then you are in good company. We often see what we need to change but may not know how to make a change or just feel stuck.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;I recently read How Women Rise by Sally Helgesen and Marshall Goldsmith in our book club at Sinclair Workforce Solutions with ten of my female-empowered professional coworkers. If you are a male reader and have made it this far, thank you for reading. Although this book was written for women, men can benefit from learning about these habits so they can help, coach, mentor, and advise their female team members, sisters, wives, or daughters.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;When I first heard about the book, I was excited about the topic and the discussion that would follow. I was already familiar with Marshall Goldsmith’s book: What Got You Here Won’t Get You There. These books are similar in that they both have habits and steps for improvements to overcome these behaviors. They are both written based on what worked when you were new in your role or new in leadership is no longer working for you and identify what might be keeping you from your next promotion. The difference is that How Women Rise is written FOR WOMEN, and they use their stories and examples to explain each of these habits.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;Women tend to see success in a different light than men. They also have different experiences at work that cause them to develop different habits and responses. If we understand what is getting in our way, then we can make a few simple behavioral tweaks, and we will be on our way to our next promotion. In general, we are far more open to change because we are more willing to consider how we may have contributed to the situation in which we find ourselves. It is important to understand your counterparts, especially if you are their leader, to help identify where they are stuck and become a mentor or promoter of their career paths.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 14px;"&gt;What are the 12 Habits that Keep Women Stuck?&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;1.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Reluctance to claim your achievements&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;2.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Expecting others to spontaneously notice and reward your contributions&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;3.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Overvaluing expertise&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;4.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Just building rather than building and leveraging relationships&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;5.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Failing to enlist allies from Day One&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;6.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Putting your job before your career&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;7.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; The Perfection Trap&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;8.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; The disease to please&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;9.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Minimizing&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;10.&amp;nbsp; Too emotional&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;11.&amp;nbsp; Ruminating&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;12.&amp;nbsp; Letting your radar distract you&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;If you would like to read a little more about each habit, check out these summaries: &lt;a href="https://www.thrivestreetadvisors.com/leadership-library/how-women-rise"&gt;Thrive&lt;/a&gt;&amp;nbsp; &lt;a href="https://happieratwork.ie/how-women-rise-by-sally-helgesen-and-marshall-goldsmith/"&gt;Happier at Work&lt;/a&gt;.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;It is a conscious self-awareness that is the first step to effective behavioral change. I have recently started a new position at a new company and feel I am in the next chapter in my life. When I looked at this list, I looked at it from this new position in life as well as where I came from. I identified several habits of which I was routinely guilty from time to time. Like my obsessive need to please people. Being a chronic pleaser is wanting to be liked by all; usually to the detriment of yourself. Rather, it is about finding your primary purpose in life. Then finding the balance between work-life integration to make time for what is truly important to you and your family.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;Perhaps you, like me, are guilty of committing these habits over your careers or with certain work groups. For instance, how many times have you caught yourself saying: “little, tiny, or quick”? These are examples of minimizing yourself and your contributions. Have you ever fallen into the Perfectionist Trap? Are you stewing over your mistakes or so focused on details that you fail to see the big picture? Ruminating is when we over-critique ourselves and we spend the rest of the day thinking about how an interaction or presentation could have gone better. Then when we seek the feedback of our colleagues, we realize we were being much too hard on ourselves.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;What’s Next? How to Break the Habit.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;During our book club discussion, we referred to the &lt;a href="http://www.howwomenrise.com/"&gt;guide&lt;/a&gt;, by the authors. We talked about each of the twelve habits and went around the room to share if this was a habit we identified with now or in the past. We also shared if this was a habit we wanted to stop or make a behavioral change. So, you may be asking where do I even start? The author gave three straightforward steps to break the habit.&lt;/font&gt;&lt;/p&gt;&lt;font style="font-size: 14px;"&gt;1.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;em&gt;Start with one thing&lt;/em&gt; – We are so good at making lists for ourselves and continue to add to them as the day goes on. This time just start with one habit or make a To Don’t List. The authors suggest creating a goal and purpose and writing it out. For instance, “I help women recognize their greatest strengths so they can act with confidence and intention.”&lt;br&gt;
2.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;em&gt;Don’t do it alone&lt;/em&gt; – Enlist in the help of others. Whether it is a coach or coworker. Make sure you choose carefully, and this person is someone you can trust. Be specific about what you want them to notice. Make your request as brief as possible. Lastly, set a time limit whether it is at a specific event or over the course of a few weeks.&lt;br&gt;
3.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;em&gt;Let go of judgement&lt;/em&gt; – We tend to judge ourselves when we fall short of our expectations or not making progress as quickly as we would like. Women tend to be harder on themselves than men. &amp;nbsp;It really is okay to say “Oh well, I messed up. Oh well, I am not perfect.” Remember each of us is a work in progress and be willing to embrace change.&lt;/font&gt;&lt;br&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;Deep down we want to believe if more women like us become more influential, the world will be a better place. When we work in a mostly male-dominated industry it is tough to break these barriers and build a culture of supporting one another to get to the next level. It is important for women to celebrate the talents, attitudes, and behaviors that have helped them get where they are today. Even as we work to change those habits that are no longer serving us.&lt;/font&gt;&lt;/p&gt;

&lt;p align="center"&gt;&lt;font style="font-size: 14px;"&gt;******&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;&lt;em&gt;Nancy Percy is a Business Development Manager at Sinclair College in Workforce Development. She develops training programs to give organizations the upskilling they need to excel in their fields.&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13208530</link>
      <guid>https://www.technologyfirst.org/Tech-News/13208530</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Tue, 25 Apr 2023 17:03:57 GMT</pubDate>
      <title>Leading And Managing In A Hybrid World</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/Greg%20Muir%20Blog.png" alt="" title="" border="0"&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;Technology First sat down with Greg Muir, Director, Technology Operations Management at Premier Health, to talk about the risks and rewards of remote and hybrid workplaces. Here is our conversation.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;" color="#099AC6"&gt;&lt;em&gt;Technology First (TF): Why are employers considering adopting a new remote work philosophy? Or, for employers who currently have one, expanding their remote work philosophy?&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;Greg Muir (Greg): Remote work has been around for years and in my opinion, the benefits are undeniable.&amp;nbsp;When COVID forced the issue for many people, it escalated implementation and forced all employers to look at not only their short-term remote work philosophy to deal with COVID, but also to consider their long term plans post-COVID.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;" color="#099AC6"&gt;&lt;em&gt;TF: Why is remote work top-of-mind for employers today? Why would they want to implement it?&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;Greg: First, to enhance employee satisfaction and engagement.&amp;nbsp;Employees who have participated in successful remote work experiences would view stopping it as taking a valuable benefit away from them.&amp;nbsp;People have seen that it can be effective, and they enjoy the benefits associated with working remotely. For example,&amp;nbsp;the reduction of travel time alone allows for more work time for the employer and more personal time for the employee.&amp;nbsp;A remote work option can be a difference maker when an in-office employee weighs staying in their current position against moving to a new employer who offers a remote work option.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;Second, remote work can attract talent. Rather than recruiting workers from Dayton, Ohio areas that are within driving distance, we can consider employees in other regions, states, and possibly other countries, without the need for a move. This greatly increases our potential labor pool.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;Also, employers can reduce their real-estate and office costs for their workforce that works remotely. Costs such as building acquisitions, space rental, and even utilities like electricity, heating, and air conditioning can create savings. So, in summary, there are benefits both to the employee and the employer.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;" color="#099AC6"&gt;&lt;em&gt;TF: How do you effectively communicate with a hybrid or fully remote staff? For example, how do you ensure everyone is clear on strategies and goals?&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;Greg: That is something that requires a very deliberate effort. There is a strong need for tools like Microsoft Teams or Zoom. We need to have interactive discussions around how our work impacts the organization’s strategies and goals; it can be more difficult to recognize that impact working remotely. So, you need to constantly talk about that and keep it front of mind when you’re having team meetings and talking with employees. We need to use the 7x7 concept of communicating: 7 ways at least 7 different times. This can be calls, Zoom meetings, written communications, videos, webinars, even kudos for projects well done and how they supported our strategies and goals. When possible, there is value to in-person gatherings as well. Many times, we will have an in-person gathering with a remote option for people that can’t attend. For example, if they live across the country, we’ll conference them in, but I still believe that there is a lot of value in getting together and having that personal touch with employees.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;" color="#099AC6"&gt;&lt;em&gt;TF: What are the risks of having remote employees? How are you mitigating them?&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;Greg: There are risks, but there are things that you can do to address those risks. Like always, we need to keep data security in mind. When you’re working from alternate workspaces, you have the potential for people to use insecure or public Wi-Fi, or someone may use an unauthorized device. To mitigate some of these things, you must have good policies and procedures in place. You also must implement security tools like private networks, time outs, and secure network connections.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;You also must keep productivity in mind. One of the fears employers of remote workers have is losing productivity. You must make sure you have both clear goals and measurable outcomes documented. Standards for acceptable response times can help with this. For example, if someone emails or communicates via voicemail, then you must have standards in place for when you expect return communication.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;It also helps to have consistency of remote work across the organization. What I mean by that is, you need to have Human Resources involved to help create policies and to provide transparency and clarity across the entire workforce. That way policies are consistent for everyone across the company and not under control of each department. For example, you can have single or multiple computing devices. If I work hybrid, then I could have a computer at home and a computer at work and you must have a policy for that. Also, if the employee has a problem, how are they going to get device support to help them through that problem? There are pieces that are the employee’s responsibility and parts that are the employer’s responsibility. It must be documented so that both parties understand what the employer provides as well as what the employee needs to provide.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;" color="#099AC6"&gt;&lt;em&gt;TF: How has going hybrid added to your infrastructure costs? For example, are you paying for employees’ high-speed internet?&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;&lt;font style="font-size: 14px;"&gt;Greg: Employee high-speed internet is a requirement to work remotely with our company. It is the employees’ responsibility to make sure they have good internet connectivity in place, and they bear the expense for that. We thought that may be an issue early on, but honestly, we haven’t seen many issues because most people who want to work remote already have required internet access in place for their personal lives. We did have to put measures in place to strengthen our remote access. We had to increase circuits, add security measures, upgrade our security to the latest versions, and use dual-factor authentication. We also had to make sure these measures did not negatively impact our services that were already remote. For example, a lot of our radiologists are contracted and read exams remotely. We moved them to their own circuits so they would not be impacted when we added in a thousand employees at the same time. Before COVID, remote access was mostly for support purposes, for example, IT support, and clinicians used it to access records in the middle of the night. But it’s a different ballgame when you’re going to have people logged on, working, utilizing video, utilizing sound, and having 1200 – 1400 people on at the same time. This impacts your infrastructure, and you must ensure that you have capacity to handle the additional volume.&lt;/font&gt;

&lt;p&gt;&lt;font style="font-size: 14px;" color="#099AC6"&gt;&lt;em&gt;TF: How has the new arrangement affected Premier’s culture?&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;Greg: It has been affected. We constantly work to build an environment of trust and to stay connected to all our employees. To do that, we organize regular formal and informal team meetings with time for Q&amp;amp;A and feedback. We also use things like virtual kudos so we can do shout outs and we try to personalize those because there are many times in the office when you would see people in person and thank them for their help on a particular project or task, but, when you’re not seeing people every day, it makes it a little more challenging to do that. So, we’ve implemented some tools to do it electronically so that it notifies both the employee and their supervisor. That way they can get positive feedback from them as well as their supervisor. We also have Town Halls and forums with options for in person or virtual. Those are important for making sure that everyone understands the mission, strategy, goals, our progress, and emphasizing corporate values. With us, employee engagement is constantly a top priority. We work very hard to make sure our employees are satisfied. If there is an issue, we stay on top of it because it can snowball quickly when people are working remotely.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;" color="#099AC6"&gt;&lt;em&gt;TF: How have you marketed a hybrid option to attract talent?&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;Greg: We have some, but there is always room for improvement. Some of our postings specify that remote work is an option, but I feel that we could do a better job on the front end to both market to and attract future employees looking to work remotely. So, rather than waiting for people to come to our website and apply for positions, we need to advertise to people that may not be in our area or may not know a remote option is available. For most employees, the ability to work remote some or all the time is very important when you’re choosing a job. And, like we talked about earlier, it gives us a much larger labor pool to pull from.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;" color="#099AC6"&gt;&lt;em&gt;TF: How is the hybrid model accelerating your digital transformation? In other words, are the existing business processes, culture, and/or customer experiences better or worse with hybrid?&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;Greg: The hybrid model isn’t something that only our work force desires. What we’re seeing is that our customers have also shifted and many of them demand hybrid systems of care. So, we have a very active and growing telehealth program, and we are constantly implementing new programs that can improve both patient care and the customer experience. We need to be open both to patients that would rather be seen in person and offer remote solutions for our patients who prefer to be seen remotely. Today, many people want to get things taken care of from their telephone or from their iPad, so we need to be able to handle that as well from our end. Telehealth is a very important strategy for us as we move forward.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;" color="#099AC6"&gt;&lt;em&gt;TF: Do you think a hybrid workplace is here to stay?&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;Greg: There is not a one size fits all answer to this question. I see some very large companies such as Tesla and Apple that are bringing employees back to the office while others are expanding their remote work options. So, I don’t think it’s the same answer for everyone. I believe that a hybrid workplace is here to stay because if you implement correctly, both the business and the employees can benefit.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;From an employee perspective, remote work avoids commute time, it can be better for wellbeing, and it provides flexibility for family needs and other obligations. If used appropriately, it can help people feel more productive and connected to the organization because we’re considerate of their time. So, that 30-40 minutes to work and 30-40 minutes home can be used for either more personal time or to get more work done.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;From the employer perspective, remote work can be a great recruiting tool, reduce expenses for office space, and, if used right, it can really create a more engaged workforce that’s closely tied to your organization. Employers must constantly work to build employee trust, encourage communication, and set clear expectations. You must make sure you have remote working strategies along with good tools, policies, and procedures to help team members stay productive, efficient, and connected while working from home.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;For all these reasons combined, I believe that remote work, if you implement it properly, and you have the appropriate tools and controls in place, can be a win/win for both the employees and employers. So, while there are advantages and disadvantages, I believe that the pros outweigh the cons for a hybrid workplace. I think it’s here to stay.&lt;/font&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13180207</link>
      <guid>https://www.technologyfirst.org/Tech-News/13180207</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Tue, 28 Mar 2023 17:56:34 GMT</pubDate>
      <title>Why The DOJ's Renewed Interest In Cybersecurity Matters To You</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/Vipal%20Patel%20Blog.png" alt="" title="" border="0"&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;Will cybersecurity-related enforcement efforts by the U.S. Department of Justice increase in the coming years?&amp;nbsp; The answer is yes.&amp;nbsp; How do we know?&amp;nbsp; Two reasons.&amp;nbsp; First, DOJ has been telling us to expect increased efforts, both generally and specifically as to cybersecurity.&amp;nbsp; Second, they have backed up their words with action.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;As a general matter, U.S. Attorney General Merrick Garland and Deputy Attorney General Lisa Monaco, have been explicit that they are prioritizing the investigation and prosecution of financial and corporate malfeasance.&amp;nbsp; Early last year, for example, AG Garland told the American Bar Association that he “had seen the Justice Department’s interest in prosecuting corporate crime wax and wane over time.&amp;nbsp; Today, it is waxing again.” His remarks reinforced those of DAG Monaco in the fall of 2021, when she announced the Biden administration’s intention “to better combat corporate crime.”&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;In addition to remarks like these, in October 2021 the DAG issued &lt;a href="https://www.justice.gov/media/1173646/dl?inline="&gt;&lt;font color="#0563C1"&gt;one memorandum&lt;/font&gt;&lt;/a&gt; and, in September 2022, a &lt;a href="https://www.justice.gov/opa/speech/file/1535301/download"&gt;&lt;font color="#0563C1"&gt;second memorandum&lt;/font&gt;&lt;/a&gt;, announcing revisions to corporate criminal enforcement policies, which apply very nearly across the entire Department and, as &lt;a href="https://www.globalinvestigations.blog/us-department-of-justice/4041/"&gt;&lt;font color="#0563C1"&gt;explained in further detail&lt;/font&gt;&lt;/a&gt;, include significant policy changes that favor stronger corporate enforcement.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;More specific to cybersecurity, DOJ late last year entered uncharted waters when it tried, &lt;a href="https://www.justice.gov/usao-ndca/pr/former-chief-security-officer-uber-convicted-federal-charges-covering-data-breach"&gt;&lt;font color="#0563C1"&gt;and the jury convicted&lt;/font&gt;&lt;/a&gt;, Uber’s former Chief Security Officer, on charges of obstruction of proceedings of the Federal Trade Commission and misprision of felony, in connection with his attempted cover-up of a 2016 hack of Uber.&amp;nbsp; The case represents what is believed to be the first federal prosecution of a corporate executive for the handling of a data breach.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;It is not just criminal cases; it is &lt;em&gt;civil&lt;/em&gt; case as well.&amp;nbsp; In a noteworthy development, DOJ &lt;a href="https://www.justice.gov/opa/pr/deputy-attorney-general-lisa-o-monaco-announces-new-civil-cyber-fraud-initiative"&gt;&lt;font color="#0563C1"&gt;announced&lt;/font&gt;&lt;/a&gt; in late 2021 its “Civil Cyber-Fraud Initiative,” seeking to hold accountable individuals or entities that put U.S. information or systems at risk.&amp;nbsp; Though the initiative, DOJ made clear its intention to utilize the False Claims Act (FCA) to pursue cybersecurity-related cases against government contractors, subcontractors, and grant recipients.&amp;nbsp; The FCA is the U.S. federal government’s primary civil tool to combat fraud against the government, as it imposes financial liability on persons and companies (typically federal contractors and subcontractors, to include Medicare, TRICARE, and Medicaid health care providers) who defraud governmental programs. &amp;nbsp;In essence, DOJ is sending a message that it will not be afraid in certain circumstances to pursue even &lt;em&gt;victims&lt;/em&gt; of cybercrime.&amp;nbsp; As part of this initiative, DOJ last year announced significant settlements in two False Claims Act cases (&lt;a href="https://www.justice.gov/opa/pr/aerojet-rocketdyne-agrees-pay-9-million-resolve-false-claims-act-allegations-cybersecurity"&gt;&lt;font color="#0563C1"&gt;Aerojet Rocketdyne&lt;/font&gt;&lt;/a&gt; and &lt;a href="https://www.justice.gov/opa/pr/medical-services-contractor-pays-930000-settle-false-claims-act-allegations-relating-medical"&gt;&lt;font color="#0563C1"&gt;Comprehensive Health Services&lt;/font&gt;&lt;/a&gt;) related to cybersecurity deficiencies or misrepresentations, and more are expected.&lt;/font&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13148365</link>
      <guid>https://www.technologyfirst.org/Tech-News/13148365</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Tue, 28 Mar 2023 15:38:51 GMT</pubDate>
      <title>Still Better Together in 2023</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Tech%20News%20Blog/Treg%20Gilstorf%20blog.png" alt="" title="" border="0"&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font style="font-size: 15px;" color="#242424" face="Verdana"&gt;This year continues to challenge most businesses. As we enter Q2, lingering issues of recession, inflation, supply chain problems, and talent shortages highlight how digital modernization remains critical to the success of our member organizations. Here are five technology trends to not only help you combat these issues but also propel your company forward on your digital modernization journey.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font style="font-size: 16px;" color="#000000"&gt;&lt;strong&gt;&lt;font style="font-size: 15px;" color="#242424" face="Verdana"&gt;Full-stack Development&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font style="font-size: 15px;" color="#242424" face="Verdana"&gt;One of the most important trends I am monitoring is the increasing emphasis on full-stack development. With the rapid pace of technological change, it is increasingly important for companies to maintain a team of developers proficient in a wide range of technologies. This includes both front-end and back-end development.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font style="font-size: 16px;" color="#000000"&gt;&lt;strong&gt;&lt;font style="font-size: 15px;" color="#242424" face="Verdana"&gt;Cybersecurity&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font style="font-size: 15px;" color="#242424" face="Verdana"&gt;As organizations continue to digitize their operations and rely more heavily on technology, the risk of cyber-attacks increases. Businesses need to invest in advanced cybersecurity measures to keep their systems and data safe.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font style="font-size: 16px;" color="#000000"&gt;&lt;strong&gt;&lt;font style="font-size: 15px;" color="#242424" face="Verdana"&gt;DevOps&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font style="font-size: 15px;" color="#242424" face="Verdana"&gt;DevOps is proving to be another significant trend this year. It will be essential for companies to have a strong DevOps culture in place to ensure that new features and updates are delivered quickly and with high quality.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font style="font-size: 16px;" color="#000000"&gt;&lt;strong&gt;&lt;font style="font-size: 15px;" color="#242424" face="Verdana"&gt;AI&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font style="font-size: 15px;" color="#242424" face="Verdana"&gt;From chatbots and virtual assistants to autonomous vehicles and drones, Artificial Intelligence and robotics are already having a massive impact on industries like manufacturing, transportation, and healthcare. As these technologies continue to evolve, businesses will need to invest in hiring AI and robotics experts to stay competitive.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font style="font-size: 16px;" color="#000000"&gt;&lt;strong&gt;&lt;font style="font-size: 15px;" color="#242424" face="Verdana"&gt;Snowflake&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font style="font-size: 15px;" color="#242424" face="Verdana"&gt;Snowflake is a data warehousing platform that allows businesses to store, process, and analyze substantial amounts of data in the cloud. As organizations persist in generating massive quantities of data, Snowflake, or similar platforms, is a technology that is essential in order for companies to grow.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font style="font-size: 15px;" color="#242424" face="Verdana"&gt;If you are a technologist looking to stay ahead of the curve in 2023 and beyond, then look no further than Technology First. Here you will gain perspective on the latest trends through conferences, newsletters, special interest forums, and Peer Groups. We gather to share thoughts, ideas, opinions, plans, and solutions in a collaborative environment. The IT community is better when we work together. Connecting, strengthening, and championing members are the reasons Technology First exists. Please join me and get more involved in the organization this year. There are numerous ways to make a difference: volunteer for a committee, speak at one of our Peer Groups, and/or bring your team to events.&amp;nbsp;Together, we can ensure our businesses are prepared for the challenges ahead for the rest of 2023.&lt;/font&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13148132</link>
      <guid>https://www.technologyfirst.org/Tech-News/13148132</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Mon, 27 Feb 2023 21:10:44 GMT</pubDate>
      <title>Machine Learning Deployed For The Opioid Epidemic</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/Caitlin%20Meadows.png" alt="" title="" border="0" width="620" height="155"&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#2A2737" face="Verdana" style="font-size: 14px;"&gt;Dayton, Ohio, and the wider Montgomery County has seen its share of tragedy during the opioid epidemic. Ohio has been one of the 10 worst-affected states in America, and the Dayton region has seen Ohio’s worst fatality rates from drug overdose&lt;a href="#_ftn1" name="_ftnref1" style=""&gt;&lt;sup&gt;&lt;sup&gt;&lt;font color="#2A2737"&gt;[1]&lt;/font&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. While a hospital or emergency room can treat an acute incident for a patient with a substance use disorder (SUD), the longer fight against relapse is often waged by other organizations. The Community Outreach Actions Team (COAT) was specifically created in Montgomery County to address the grave opioid situation. The Public Health Quick Reaction Team (QRT) seeks to identify at-risk individuals and get them enrolled in treatment. The efforts of this community collaboration saw overdose deaths fall from 566 in 2017 to 289 in 2018, a decrease of 59%&lt;a href="#_ftn2" name="_ftnref2" style=""&gt;&lt;sup&gt;&lt;sup&gt;&lt;font color="#2A2737"&gt;[2]&lt;/font&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#2A2737" face="Verdana" style="font-size: 14px;"&gt;The Montgomery County Emergency Room Overdose Notification (MC-ERON) system has enabled Dayton’s Alcohol, Drug Addiction and Mental Health board, and Public Health – Dayton and Montgomery County to provide outreach services to residents who experienced an emergency hospital visit due to a drug overdose, since 2018. MC-ERON generates a daily list of patient health and contact information that can be used to mobilize outreach efforts that would minimize the risk of further overdoses and deaths. However, MC-ERON did not prioritize, nor indicate, which patients are at a higher risk for additional overdoses or death. To overcome this limitation, the MC-ERON risk-stratification model is designed to estimate a patient’s risk score based on their demographic information, health history, and previous drug-related encounters with law enforcement and the health system, then assign a priority level to that patient based on the score. The risk score is then used to bin patients into four risk ‘priority levels’ which is provided to outreach personnel to contact the most at-risk patients. By comparing newly discharged overdose patients to those who previously died in-hospital, risk stratification scores can be calculated and included in the daily notifications to ADAMHS and PHDMC’s QRT.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#2A2737" face="Verdana" style="font-size: 14px;"&gt;The MC-ERON Risk-Stratification model has been deployed to PHDMC peer outreach specialists since 2019, with high overall model performance (AUC in the range of 0.82 to 0.85). Since deployment, individuals who died during or after the overdose encounter were scored as "high-risk" or "high-priority". Those that died during their hospital visit would not have benefited from outreach after their overdose; however, these patients highlight that the scores reflect the level of risk. For the patients who died after the encounter, this data suggests they would have been accurately prioritized for outreach services.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#2A2737" face="Verdana" style="font-size: 14px;"&gt;Despite these analytical successes, the MC-ERON Risk stratification algorithm represents a mismatch between problems faced by users and the ultimate solution. For peer outreach specialists, by the time the QRT is activated, the individual is already in crisis and at risk; therefore, the individual's precise "risk" is less valuable than the information provided along side the score.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#2A2737" face="Verdana" style="font-size: 14px;"&gt;The MC-ERON Risk-Stratification model was created before Ascend had a robust user focus. While the model and insights are valuable for PHDMC epidemiologists, the target users- the peer outreach specialists - find the most value in the contextual data features that accompany the actual predicted "risk score”. This mismatch between problem and solution has limited the impact of the Risk-Stratification model, and possibly limited the impact that machine learning could make on an urgent community problem. For example, peer outreach specialists are looking for ways to identify individuals that would most benefit from their intervention. For example, a model that could identify the likelihood of an individual to seek treatment, or identifying those individuals experiencing substance "abuse" vs "use" as those who are "using", rather than "abusing", may benefit from more sustained outreach to address addiction and chronic use.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#2A2737" face="Verdana" style="font-size: 14px;"&gt;Not understanding the context of the problems faced by a user can lead to gaps and missed opportunities when creating a predictive model. Upfront discovery is key to understanding the business and user needs to build the right predictive model that addresses problems within the current systems. Always keeping the user's needs top of mind will deliver the highest value to the business and the end user of your analysis.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;&lt;font&gt;[1]&lt;/font&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://journals.stfm.org/familymedicine/2018/june/bowman-2018-0131&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;sup&gt;&lt;sup&gt;&lt;font&gt;[2]&lt;/font&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://www.mcohio.org/2018%20Community%20Overdose%20Action%20Team%20(COAT)%20Annual%20Report.pdf&lt;/font&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13112796</link>
      <guid>https://www.technologyfirst.org/Tech-News/13112796</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Mon, 27 Feb 2023 20:53:43 GMT</pubDate>
      <title>Are You Stuck?</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/Melissa%20Cutcher.png" alt="" title="" border="0" width="660" height="165" style="margin: 0px;"&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li style="list-style: none; display: inline;"&gt;
    &lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;&lt;font style=""&gt;I’ve never been much for New Year’s resolutions. Instead, I like reviewing the previous year’s accomplishments, challenges, and outcomes. This year, I used an assessment wheel to evaluate different areas of my life:&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li style="list-style: none; display: inline"&gt;
    &lt;ul&gt;
      &lt;li&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;Career&lt;/font&gt;&lt;/li&gt;

      &lt;li&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;Fun and recreation&lt;/font&gt;&lt;/li&gt;

      &lt;li&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;Money and finances&lt;/font&gt;&lt;/li&gt;

      &lt;li&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;Physical environment&lt;/font&gt;&lt;/li&gt;

      &lt;li&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;Personal growth&lt;/font&gt;&lt;/li&gt;

      &lt;li&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;Health and wellness&lt;/font&gt;&lt;/li&gt;

      &lt;li&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;Friends, family, and significant others&lt;/font&gt;&lt;/li&gt;
    &lt;/ul&gt;
  &lt;/li&gt;

  &lt;li style="list-style: none; display: inline"&gt;
    &lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;&lt;span style=""&gt;As I considered all the aspects of the wheel, specifically regarding career, it helped me think about my:&lt;/span&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li style="list-style: none; display: inline"&gt;
    &lt;ul&gt;
      &lt;li&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;Skills&lt;/font&gt;&lt;/li&gt;

      &lt;li&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;Talents&lt;/font&gt;&lt;/li&gt;

      &lt;li&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;Work environment&lt;/font&gt;&lt;/li&gt;

      &lt;li&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;Opportunities for growth&lt;/font&gt;&lt;/li&gt;

      &lt;li&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;Current commitments &amp;nbsp;&lt;/font&gt;&lt;/li&gt;
    &lt;/ul&gt;
  &lt;/li&gt;

  &lt;li style="list-style: none; display: inline;"&gt;
    &lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;&lt;font&gt;All great things to think about! Which led me to pulling down a book from my shelf, &lt;em style=""&gt;“&lt;/em&gt;&lt;a href="http://www.howwomenrise.com/" style="" target="_blank"&gt;&lt;font&gt;&lt;em&gt;How Women Rise&lt;/em&gt;&lt;/font&gt;&lt;/a&gt;&lt;em style=""&gt;,&lt;/em&gt;” by Sally Helgesen and Marshall Goldsmith. I read this book several years ago and absolutely LOVED it! The authors recognized women “face specific and often different roadblocks from men as they advance in the workplace”. So, as you look back on your 2022, and specifically your career, how are you feeling? Do you feel stuck?&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;&lt;font&gt;Helgesen and Goldsmith ask these questions:&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li style="list-style: none; display: inline"&gt;
    &lt;ul&gt;
      &lt;li&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;Do you feel something is preventing you from moving forward or from leading the life you’re supposed to be living?&lt;/font&gt;&lt;/li&gt;

      &lt;li&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;Do you feel unable to break through circumstances that are conspiring to hold you down?&lt;/font&gt;&lt;/li&gt;

      &lt;li&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;Do you feel as if your contributions are not recognized or appreciated?&lt;/font&gt;&lt;/li&gt;

      &lt;li&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;Do you feel the people around you have no idea what you’re capable of achieving?&lt;/font&gt;&lt;/li&gt;
    &lt;/ul&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;If you answered yes to most of these questions, then this book is for you! If, like me, you are wondering how to become unstuck, then reading this book will help you uncover the habits that hold you back from rising to your full career potential.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;For a more gender-neutral point of view, read &lt;em&gt;“&lt;/em&gt;&lt;a href="https://marshallgoldsmith.com/book-page-what-got-you-here/" target="_blank"&gt;&lt;font&gt;&lt;em&gt;What Got You Here, Won’t Get you There&lt;/em&gt;&lt;/font&gt;&lt;/a&gt;&lt;em&gt;,”&lt;/em&gt; by Marshall Goldsmith with Mark Reiter. This book is a broader stroke on the question, “What is holding you back?”&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;I hope you unearth the habits that no longer serve you. I believe leaving them behind will get you further down your path to success. Please &lt;a href="https://www.linkedin.com/in/melissacutcher/" target="_blank"&gt;&lt;font&gt;connect&lt;/font&gt;&lt;/a&gt; with me and let me know how you got unstuck.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 15px;"&gt;You’ve got this! Together anything is possible!&lt;/font&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13112778</link>
      <guid>https://www.technologyfirst.org/Tech-News/13112778</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Mon, 27 Feb 2023 20:43:22 GMT</pubDate>
      <title>Aligning Our Missions</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/Barlow%20Tech%20News%20Blog.png" alt="" title="" border="0" width="624" height="156"&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font style="font-size: 15px;" color="#000000" face="Verdana"&gt;It has been my pleasure on behalf of the Strategic Ohio Council for Higher Education (SOCHE) to collaborate closely with Melissa Cutcher and Technology First for many years. Some of our earliest collaborations were through Cin-Day Cyber and Career Adventures Camp. As the President of SOCHE, my focus is on leading our organization in collaborating with K-12 districts, colleges, universities, and industry to transform the economy through education and employment. This mission focus has resulted in sitting in many meetings at tables with Technology First.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font style="font-size: 15px;" color="#000000" face="Verdana"&gt;SOCHE’s workforce development mission set has led us to many collaborative initiatives with Technology First and its many members.&amp;nbsp; This regular engagement between our organizations has led us to recognize the need for closer organizational alignment and I’m very excited that Technology First has asked me and SOCHE to the inner circle through their Board of Directors.&amp;nbsp; Our organizational missions at SOCHE and Technology First are very closely aligned and have led us to work on the same project on multiple occasions.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font style="font-size: 15px;" color="#000000" face="Verdana"&gt;Through SOCHE’s work on Technology First’s Board of Directors, we hope to increase our work together and further align our work for the benefit of workforce development of information technology professionals across the region, while we work together to build upon our region’s existing economic development prowess. Close relationships through SOCHE’s 22 College and University members and Technology First’s members can only help our region become the premier location for professionals in IT as well as for businesses who are looking for a new home.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font style="font-size: 15px;" color="#000000" face="Verdana"&gt;Our region has the workforce needed for the future with over 400K college and university students and close to 15K High School students. Our next generation of working Daytonians is already here in our region and it is our job to show them the pathway to great careers. We can make this happen through our engagement in our schools as well as by encouraging our students to spend time in our companies learning about our many different industries. Over the next few years as we manage decreasing numbers of students in each of our schools it is imperative for all businesses to engage and ensure that we are assisting all students to achieve their potential with at least a high school diploma and potentially a post-secondary certification or degree. I look forward to working with all of you to continue to make the Dayton region a great place to live, work and play!&lt;/font&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13112749</link>
      <guid>https://www.technologyfirst.org/Tech-News/13112749</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Tue, 31 Jan 2023 16:41:48 GMT</pubDate>
      <title>It's Time To Start Thinking Differently About CyberSecurity Training</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/Connie%20Matthews.png" alt="" title="" border="0"&gt;&lt;/p&gt;

&lt;p align="center"&gt;&lt;font style="font-size: 16px;"&gt;&lt;font face="Verdana" style="" color="#099AC6"&gt;&lt;strong&gt;It’s no secret that finding and keeping talent in the Information Security space continues to be challenging for organizations.&amp;nbsp;&lt;/strong&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;&lt;font face="Segoe UI, sans-serif" style="color: rgb(0, 0, 0);"&gt;&amp;nbsp;&lt;/font&gt;&lt;font face="Verdana" style=""&gt;We must continue to think differently about how we recruit and retain talent, what resources we utilize, and how we engage in the community.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;&lt;em&gt;&lt;u&gt;&lt;font face="Verdana" color="#01507A"&gt;Why Developing your teams is critical to building a robust security program:&lt;/font&gt;&lt;/u&gt;&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;

&lt;div style="margin-left: 2em"&gt;
  &lt;ul&gt;
    &lt;li&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;&lt;font style="font-size: 15px;" color="#4D5758"&gt;Demands from regulations and cyber insurance require training as part of your business plan&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;&lt;font style="font-size: 15px;" color="#4D5758"&gt;It helps prepare your team and gives opportunities for more responsibilities and promotion – advancement&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;div style="margin-left: 2em"&gt;
  &lt;ul&gt;
    &lt;li&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;&lt;font style="font-size: 15px;" color="#4D5758"&gt;It helps with testing efficiency and knowledge within the area of expertise&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;&lt;font style="font-size: 15px;" color="#4D5758"&gt;Improvement of security knowledge/skills&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;&lt;font style="font-size: 15px;" color="#4D5758"&gt;Cross-training teams – to avoid single points of failure&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;&lt;em&gt;&lt;u&gt;&lt;font face="Verdana" color="#01507A"&gt;Things for consideration in building a training program:&lt;/font&gt;&lt;/u&gt;&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;

&lt;div style="margin-left: 2em"&gt;
  &lt;ul&gt;
    &lt;li&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;&lt;font style="font-size: 15px;" color="#4D5758"&gt;Blended Learning Programs – Meeting people where they are (not everyone learns the same way)&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;&lt;font style="font-size: 15px;" color="#4D5758"&gt;Funding Sources – Ohio TechCred as an example&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;&lt;font style="font-size: 15px;" color="#4D5758"&gt;Consider building out repeatable training programs that align with business needs&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;&lt;em&gt;&lt;u&gt;&lt;font face="Verdana" color="#01507A"&gt;Finding Talent:&lt;/font&gt;&lt;/u&gt;&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;

&lt;div style="margin-left: 2em"&gt;
  &lt;ul&gt;
    &lt;li&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;&lt;font style="font-size: 15px;" color="#4D5758"&gt;Creating Apprenticeships programs with current teams from other areas of the business&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;&lt;font style="font-size: 15px;" color="#4D5758"&gt;Creating Security Champions&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;&lt;font style="font-size: 15px;" color="#4D5758"&gt;Attending local conferences to find talent&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;&lt;font style="font-size: 15px;" color="#4D5758"&gt;Working with High School STEAM Programs&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;

    &lt;li&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;&lt;font style="font-size: 15px;" color="#4D5758"&gt;Engage with local Special Interest Groups&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;&lt;em style=""&gt;&lt;font&gt;For the &lt;a href="https://www.technologyfirst.org/Ohio-Information-Security-Conference" target="_blank"&gt;Ohio Information Security Conference&lt;/a&gt;, &lt;a href="https://www.reynconsecurity.com/" target="_blank"&gt;&lt;font color="#01507A"&gt;ReynCon&lt;/font&gt;&lt;/a&gt; will present “&lt;/font&gt;&lt;/em&gt;&lt;em style=""&gt;&lt;font&gt;Building a Cybersecurity Culture: It’s Time to Think Differently About Training.”&lt;/font&gt;&lt;/em&gt;&lt;em style=""&gt;&lt;font color="#4D5758"&gt;&amp;nbsp;&lt;/font&gt;&lt;/em&gt;&lt;em style=""&gt;&lt;font style=""&gt;Join us at Sinclair Conference Center at 10:45 am on 03/01/23&lt;/font&gt;&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13079486</link>
      <guid>https://www.technologyfirst.org/Tech-News/13079486</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Mon, 30 Jan 2023 19:16:30 GMT</pubDate>
      <title>Protecting the US Communication Supply Chain</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/Shawn%20Waldman%20Tech%20News%20Blog%20V2.png" alt="" title="" border="0"&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#0E101A" face="Verdana, sans-serif" style="font-size: 16px;"&gt;The United States' communication supply chain is a critical infrastructure that enables the country's economic and national security. However, it is also a vulnerable target for foreign adversaries looking to exploit weaknesses and gain access to sensitive information. In this article, we will discuss the importance of protecting the US communication supply chain and the steps that can be taken to do so.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#0E101A" face="Verdana, sans-serif" style="font-size: 16px;"&gt;One of the biggest threats to the US communication supply chain is the potential for foreign adversaries to introduce malicious hardware or software into the system. This can be done through various methods, such as compromising manufacturing processes or infiltrating supply chains. Once in place, these malicious components can be used to steal sensitive data, disrupt communications, or even gain control of critical infrastructure.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#0E101A" face="Verdana, sans-serif" style="font-size: 16px;"&gt;It is essential to take a multi-layered approach to Cybersecurity. Implementing network segmentation is one of the best ways to protect networks from foreign interference. This involves dividing a network into smaller segments, each with its own security controls. This makes it more difficult for attackers to access sensitive data and systems.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#0E101A" face="Verdana, sans-serif" style="font-size: 16px;"&gt;Another way is to be sure you have a good inventory of your network. What's operating on your network? Remember the CIS Controls and the two most important controls. Know your hardware and know your software. You can't mount any defense or response if you don't see what you have.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#0E101A" face="Verdana, sans-serif" style="font-size: 16px;"&gt;TikTok, the popular social media app known for its short-form videos, has become a household name in recent years. While the app has been praised for its creativity and entertainment value, it has also raised concerns about its potential security risks.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#0E101A" face="Verdana, sans-serif" style="font-size: 16px;"&gt;Another threat of TikTok is the potential for foreign interference. The app is owned by Chinese company ByteDance, which has been accused of censoring content and spreading disinformation. This has led to concerns about the app's ability to influence public opinion and political campaigns. How do you mount a defense against TikTok?&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#0E101A" face="Verdana, sans-serif" style="font-size: 16px;"&gt;To protect the US communication supply chain, it is essential to implement strict security measures throughout the entire process, from the design and development phase to the final deployment. This includes conducting thorough background checks on suppliers and vendors and performing regular security assessments and penetration testing on all components of the system.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#0E101A" face="Verdana, sans-serif" style="font-size: 16px;"&gt;Another critical step is to increase the use of secure communication technologies, such as end-to-end encryption and security protocols. This can help protect against eavesdropping and other forms of cyber espionage. It's also important to have incident response plans in place so that organizations can quickly respond to any security breaches or disruptions.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#0E101A" face="Verdana, sans-serif" style="font-size: 16px;"&gt;The US government can also play a key role in protecting the communication supply chain by implementing regulations and standards for the industry. This includes setting guidelines for the design, development, and deployment of communication systems, as well as providing funding for research and development of secure technologies.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#0E101A" face="Verdana, sans-serif" style="font-size: 16px;"&gt;In addition, it is important to have international collaboration and information sharing in order to address the global challenges of the communication supply chain. The US government can work with other countries and international organizations to share information about threats and best practices and to coordinate efforts to protect critical infrastructure.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#0E101A" face="Verdana, sans-serif" style="font-size: 16px;"&gt;In conclusion, protecting the US communication supply chain is essential for ensuring the country's economic and national security. By implementing strict security measures, increasing the use of secure technologies, and working with the government and international partners, organizations can better defend against the threats of foreign adversaries and ensure the integrity of the communication supply chain.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#0E101A" face="Verdana, sans-serif" style="font-size: 16px;"&gt;I'll be speaking at the &lt;a href="https://www.technologyfirst.org/Ohio-Information-Security-Conference" target="_blank"&gt;Ohio Information Security Conference&lt;/a&gt; in March and will go into more detail on how to protect and respond to these and future threats.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" color="#000000" face="Times New Roman, serif"&gt;&lt;em&gt;&lt;font color="#0E101A" face="Verdana, sans-serif"&gt;The Author: Shawn Waldman is the founder and CEO of &lt;a href="https://securecyberdefense.com/" target="_blank"&gt;Secure Cyber Defense&lt;/a&gt; in Moraine OH. Shawn has created one of the only local firms that 100% focuses on Cybersecurity and has built its own Security Operations Center. Shawn is a subject matter expert and thought leader on Cyber and speaks at conferences globally on the topic.&lt;/font&gt;&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13078258</link>
      <guid>https://www.technologyfirst.org/Tech-News/13078258</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Mon, 28 Nov 2022 17:53:50 GMT</pubDate>
      <title>2022 Year In Review</title>
      <description>&lt;p&gt;&lt;br&gt;&lt;/p&gt;

&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/2022%20December%20Blog.png" alt="" title="" border="0"&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;Connect, Strengthen, Champion, and a Partridge in a Pear Tree&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;We were torn between writing you an annual report or an end-of-the-year holiday newsletter. You know the type: That yearly three-page single spaced book full of family highlights that falls out of your best friend from high school’s glitter encrusted Christmas card.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;Instead, we chose to give you a Top 12 List of 2022 in Review. You’re welcome!&lt;/font&gt;&lt;/p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/January%20image.png" alt="" title="" border="0" width="200" height="110" align="left" style="margin: 0px 5px 0px 0px;"&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;font&gt;&lt;strong&gt;January&lt;/strong&gt; – We kicked off the year helping you get organized with a member-to-member benefit session with&lt;/font&gt; &lt;a href="http://organizationsolutionsllc.com" target="_blank"&gt;&lt;font&gt;Organization Solutions&lt;/font&gt;&lt;/a&gt;&lt;font&gt;. Our Peer Groups for Infrastructure/Cloud and Women for Technology began their new year’s programming together. We saw the birth of a workforce subcommittee in conjunction with Montgomery County Educational Service Center. We finished off the month hosting our annual CIO Forecast Panel.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;font&gt;&lt;br&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/Feb%20.jpg" alt="" title="" border="0" width="209" height="110" align="left" style="margin: 0px 5px 0px 0px;"&gt;&lt;font style="font-size: 14px;"&gt;&lt;strong&gt;Feb&lt;/strong&gt;&lt;strong&gt;ruary&lt;/strong&gt; –February’s main event was the annual Digital Mixer held at &lt;a href="https://business.wright.edu/information-systems-and-supply-chain-management" target="_blank"&gt;&lt;font&gt;Wright State University&lt;/font&gt;&lt;/a&gt;. Over 140 students and employees connected to explore career possibilities. Women 4 Technology had a fascinating conversation around The Great Resignation.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;&lt;span&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/March.jpg" alt="" title="" border="0" width="211" height="160" align="left" style="margin: 0px 5px 0px 0px;"&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;&lt;strong&gt;March&lt;/strong&gt; – If it’s March, then it’s all about the Ohio Information Security Conference. &lt;a target="_blank"&gt;Over 300 people&lt;/a&gt;&amp;nbsp; gathered at &lt;a href="https://www.sinclair.edu/" target="_blank"&gt;Sinclair&lt;/a&gt; Conference Center to share knowledge of the latest cybersecurity threats and strengthen their processes.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Calibri, sans-serif" style="font-size: 13px;"&gt;&lt;font style="font-size: 11px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Calibri, sans-serif" style="font-size: 13px;"&gt;&lt;font style="font-size: 11px;"&gt;&lt;br&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Calibri, sans-serif" style="font-size: 13px;"&gt;&lt;font style="font-size: 11px;"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/April.jpg" alt="" title="" border="0" width="207" height="155" style="margin: 0px 5px 0px 0px;" align="left"&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;&lt;strong&gt;April&lt;/strong&gt; –Executive Director, Melissa Cutcher, represented Technology First at a workshop to teach web development at the Innovation Hub in the downtown Dayton Arcade building. We were back in person for a Tech Forum addressing staffing challenges &amp;amp; labor shortages in the IT community with Cassie Barlow, Doug McCollough, Chad Bridgman, and Matt Coatney.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/May.jpg" width="206" height="156" align="left" style="margin: 0px 5px 0px 0px;"&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;&lt;strong&gt;May&lt;/strong&gt; – May saw the &lt;a href="https://technologyfirst.org/Peer-Forum" target="_blank"&gt;Peer Groups&lt;/a&gt; in full swing&amp;nbsp; championing data analytics and cybersecurity. We ventured down south to Mason for some Tech Thursday networking. Executive Director, Melissa Cutcher, participated in an OCEA panel discussion.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;&lt;br&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/June.jpg" width="200" height="153" align="left" style="margin: 0px 5px 0px 0px;"&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;&lt;strong&gt;June&lt;/strong&gt; – Women 4 Technology squeezed over 25 participants into Warped Wing’s Springboro location for a Meaningful Networking session. Members enjoyed a Dayton Dragons’ game courtesy of our annual partners &lt;a href="https://www.altafiber.com/business/special-content/dayton-solutions" target="_blank"&gt;altafiber&lt;/a&gt; and &lt;a href="https://4atc.com/" target="_blank"&gt;ATC&lt;/a&gt;. Executive Director, Melissa Cutcher, represented Technology First at a two-day workforce development retreat with &lt;a href="https://www.technologyfirst.org/mcesc.org"&gt;Montgomery County Educational Service Center&lt;/a&gt;.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/July.jpg" alt="" title="" border="0" width="199" height="151" align="left" style="margin: 0px 5px 0px 0px;"&gt;&lt;font face="Verdana"&gt;&lt;strong&gt;July&lt;/strong&gt; – Given the success of the Springboro event, &lt;a href="https://technologyfirst.org/Women-4-Technology" target="_blank"&gt;&lt;font&gt;Women 4 Technology&lt;/font&gt;&lt;/a&gt; ventured down the road to Fretboard Brewing Company in Cincinnati to offer another Meaningful Networking session to our members.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 14px;"&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;

&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/August.jpg" alt="" title="" border="0" width="199" height="257" align="left" style="margin: 0px 5px 0px 0px;"&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;font color="#000000"&gt;&lt;strong&gt;August&lt;/strong&gt; – Peer Groups for IT Leaders, Infrastructure/Cloud, Cybersecurity, and Data Analytics all met to&lt;/font&gt; &lt;span style="background-color: white;"&gt;&lt;font color="#000000"&gt;learn new or different approaches, validate thoughts, and expand on their existing practices&lt;/font&gt;&lt;/span&gt;&lt;font&gt;&lt;font color="#000000"&gt;. Technology First partnered with&lt;/font&gt; &lt;a href="https://www.thecircuit.net/" target="_blank"&gt;&lt;font&gt;The Circuit&lt;/font&gt;&lt;/a&gt; &lt;font color="#000000"&gt;for a fun night of IT networking in Hamilton at Municipal Brew Works.&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;font&gt;&lt;font color="#000000"&gt;&lt;br&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;font color="#000000"&gt;&lt;br&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;font color="#000000"&gt;&lt;br&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;font color="#000000"&gt;&lt;br&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;font color="#000000"&gt;&lt;br&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;font&gt;&lt;font color="#000000"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/September.jpg" alt="" title="" border="0" width="193" height="191" align="left" style="margin: 0px 5px 0px 0px;"&gt;&lt;/font&gt;&lt;font&gt;&lt;strong style="color: rgb(0, 0, 0);"&gt;September&lt;/strong&gt; &lt;font color="#000000"&gt;– We enjoyed supporting some members participating in the COMSPARK conference. We also had a wonderful turnout at the annual Golf Outing benefitting the&lt;/font&gt; &lt;a href="https://technologyfirst.org/Scholarships" target="_blank"&gt;&lt;font&gt;Technology First Scholarship Fund&lt;/font&gt;&lt;/a&gt;&lt;font color="#000000"&gt;. You helped us raise almost $7000 to award qualified, regional college students!&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;font&gt;&lt;font&gt;&lt;font color="#000000"&gt;&lt;br&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;font color="#000000"&gt;&lt;br&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;font color="#000000"&gt;&lt;br&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;font&gt;&lt;font color="#000000"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/October.jpg" alt="" title="" border="0" width="195" height="233" align="left" style="margin: 0px 5px 0px 0px;"&gt;&lt;/font&gt; &lt;font&gt;&lt;font&gt;&lt;strong style="color: rgb(0, 0, 0);"&gt;October&lt;/strong&gt; &lt;font color="#000000"&gt;– We are happy a few members of the Board of Directors were able to witness Executive Director, Melissa Cutcher, receive the Jeanne Porter Career Achievement Award from Women in Business Networking at their annual gala. Congratulations, Melissa, so well-deserved! We stopped by&lt;/font&gt; &lt;a href="https://www.soche.org/" target="_blank"&gt;&lt;font&gt;SOCHE&lt;/font&gt;&lt;/a&gt;&lt;font color="#099AC6"&gt;’&lt;/font&gt;&lt;font color="#099AC6"&gt;s&lt;/font&gt; &lt;font color="#000000"&gt;55&lt;/font&gt;&lt;sup style="color: rgb(0, 0, 0);"&gt;th&lt;/sup&gt; &lt;font color="#000000"&gt;Anniversary lunch to congratulate them. This month provided members the opportunity to volunteer at the Girl Scouts of Western Ohio’s Cyber Challenge. AND we celebrated Technology First’s 25&lt;/font&gt;&lt;sup style="color: rgb(0, 0, 0);"&gt;th&lt;/sup&gt; &lt;font color="#000000"&gt;Anniversary! We were honored to receive a&lt;/font&gt; &lt;a href="https://www.ohiochannel.org/video/lt-governor-husted-technology-first-25th-anniversary-2022" target="_blank"&gt;&lt;font&gt;proclamation&lt;/font&gt;&lt;/a&gt; &lt;font color="#000000"&gt;from the State of Ohio from Lt. Governor, Jon Husted.&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font color="#000000"&gt;&lt;br&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font color="#000000"&gt;&lt;br&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font color="#000000"&gt;&lt;br&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;font&gt;&lt;font&gt;&lt;font color="#000000"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/November.jpg" alt="" title="" border="0" width="197" height="262" align="left" style="margin: 0px 5px 0px 0px;"&gt;&lt;/font&gt;&lt;font&gt;&lt;strong style="color: rgb(0, 0, 0);"&gt;November&lt;/strong&gt; &lt;font color="#000000"&gt;– More volunteer opportunities this month through the&lt;/font&gt; &lt;a href="http://www.daytonmetrolibrary.org/" target="_blank"&gt;&lt;font&gt;Dayton Metro Library&lt;/font&gt;&lt;/a&gt;&lt;font color="#099AC6"&gt;’s&lt;/font&gt;&lt;/font&gt; &lt;font color="#000000" style="color: rgb(0, 0, 0);"&gt;Career Adventure Days and The Girl Scouts of Western Ohio’s STEM Career Fair. And, of course, we gathered with 400+ IT professionals from all over the state for our 16&lt;sup&gt;th&lt;/sup&gt; Annual Taste of IT conference at Sinclair Conference Center. We ended the day with the 9&lt;sup&gt;th&lt;/sup&gt; Annual Leadership Awards where we recognized 11 categories of exceptional IT talent from the Dayton region.&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;font&gt;&lt;font&gt;&lt;font color="#000000" style="color: rgb(0, 0, 0);"&gt;&lt;br&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;font color="#000000"&gt;&lt;font color="#000000"&gt;&lt;font color="#000000"&gt;&lt;br&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;font color="#000000"&gt;&lt;font color="#000000"&gt;&lt;font color="#000000"&gt;&lt;br&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;font color="#000000"&gt;&lt;font color="#000000"&gt;&lt;font color="#000000"&gt;&lt;br&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font style="font-size: 14px;"&gt;&lt;font&gt;&lt;font&gt;&lt;font face="Verdana"&gt;&lt;strong&gt;&lt;br&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font style="font-size: 14px;"&gt;&lt;font&gt;&lt;font&gt;&lt;font face="Verdana"&gt;&lt;strong&gt;December&lt;/strong&gt; – Since this month just started, here’s a preview instead of a review. We will close out 2022 with these Peer Group meetings: &lt;a href="https://technologyfirst.org/event-4449001" target="_blank"&gt;&lt;font&gt;IT Leaders&lt;/font&gt;&lt;/a&gt;, &lt;a href="https://technologyfirst.org/event-4449019" target="_blank"&gt;&lt;font&gt;Data Analytics&lt;/font&gt;&lt;/a&gt;, &lt;a href="https://technologyfirst.org/event-4449041" target="_blank"&gt;&lt;font&gt;Cybersecurity&lt;/font&gt;&lt;/a&gt;, &lt;a href="https://technologyfirst.org/event-4449025" target="_blank"&gt;&lt;font&gt;Infrastructure/Cloud&lt;/font&gt;&lt;/a&gt;, and &lt;a href="https://technologyfirst.org/event-4449037" target="_blank"&gt;&lt;font&gt;Women 4 Technology&lt;/font&gt;&lt;/a&gt;. Please join us!&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;Thank you for connecting, strengthening, and championing the best-connected IT community in the Dayton region!&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;font&gt;&lt;font&gt;&lt;font&gt;&lt;font color="#099AC6"&gt;#UniteDaytonTech&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;font color="#000000"&gt;&lt;font color="#000000"&gt;&lt;font color="#000000"&gt;&lt;br&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/13005511</link>
      <guid>https://www.technologyfirst.org/Tech-News/13005511</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Sun, 30 Oct 2022 20:22:09 GMT</pubDate>
      <title>Keeping Humans in the Loop</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/Bill%20Baez.png" alt="" title="" border="0"&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Calibri, sans-serif" style="font-size: 14px;"&gt;&lt;font face="Verdana, sans-serif" style=""&gt;One of the biggest mistakes that data teams often make is jumping straight to developing a solution and not spending enough time with&lt;/font&gt; &lt;font face="Verdana, sans-serif" style=""&gt;the people who will be using them and&lt;/font&gt; &lt;font face="Verdana, sans-serif" style=""&gt;understanding their true goals.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" color="#000000" style="font-size: 14px;"&gt;Sometimes these goals, and the challenges to reaching them, are easy to identify. This is usually true if a data scientist is already working in the problem space or is already integrated into the business processes.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" color="#000000" style="font-size: 14px;"&gt;However, many data scientists operate as an outside consultant who is brought in to help drive strategic goals. This can lead to misunderstanding the problem and creating a solution that doesn’t live up to stakeholder expectations.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" color="#000000" style="font-size: 14px;"&gt;Or worse — creating the wrong solution.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" color="#000000" style="font-size: 14px;"&gt;A data team’s first instinct is often to begin with understanding the data. However, they first need to understand the people involved in the problem and who want a solution to it.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" color="#000000" style="font-size: 14px;"&gt;We can have all the data in the world but if we do not know how users or stakeholders interact with it and understand it in their terms, we cannot possibly make a solution that is going to fully solve their problem.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" color="#000000" style="font-size: 14px;"&gt;But you’re in luck! There is a framework you can use to help overcome this risk before even seeing any data. This framework is &lt;em&gt;design thinking&lt;/em&gt; - a growing trend within data science long used in product development. Empathizing with your stakeholders is the first step to better understanding the problem they are trying to solve.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" color="#000000" style="font-size: 14px;"&gt;A simple way to start gaining empathy is by conducting interviews with your stakeholders, leadership, and team leads. You’ll be surprised by what you will learn by spending an hour (or more) in one-on-one meetings.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" color="#000000" style="font-size: 14px;"&gt;Importantly, you’ll learn how they are doing the work today. You’ll also begin to learn the language, jargon, and methods that these people use and where they see the gap. Ultimately, you want to gather their ideas on how they would want to use a solution if they had a magic wand to make everything better.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" color="#000000" style="font-size: 14px;"&gt;You also want to understand how leadership is currently driving business goals and figure out how a solution could contribute to those outcomes. And if it doesn’t contribute to the business goals, is it something that the stakeholders really want or need?&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana, sans-serif" color="#000000" style="font-size: 14px;"&gt;Data science is a collaborative effort between you and those using your solution. Success starts by fostering a deep interest in the people for whom these solutions are built.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana, sans-serif" color="#000000" style="font-size: 14px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" face="Calibri, sans-serif" style="font-size: 14px;"&gt;&lt;em&gt;&lt;font color="#2A2737" face="Verdana, sans-serif"&gt;Ascend is a socially impactful technology company that provides data driven products and consulting services to help organizations solve complex community health problems.&lt;/font&gt;&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Calibri, sans-serif" style="font-size: 14px;"&gt;&lt;em style=""&gt;&lt;span style="background-color: white;"&gt;&lt;font face="Verdana, sans-serif" style=""&gt;&lt;font color="#000000"&gt;For Taste of IT, as part of the Developer/Data Analytics track, Ascend Innovations will be presenting&lt;/font&gt; &lt;font color="#099AC6"&gt;'&lt;/font&gt;&lt;font color="#099AC6"&gt;Keeping Humans in the Loop: Human-Centered Design in Data Science and Analytics'.&lt;/font&gt; &lt;font color="#000000"&gt;Join us in Room 122 at 3:40p.m.&lt;/font&gt;&lt;/font&gt;&lt;/span&gt;&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/12971961</link>
      <guid>https://www.technologyfirst.org/Tech-News/12971961</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Sun, 30 Oct 2022 20:06:20 GMT</pubDate>
      <title>Changes in the Cybersecurity Landscape</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/ATC%20-%20Louie%20Hollmeyer.png" alt="" title="" border="0"&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;The ever-expanding digital footprint of modern organizations is causing business owners to rethink their security technology stack to address sophisticated new threats. To better manage cyber risk, businesses are evolving and reframing security practices in preparation for the changing cybersecurity landscape. Unfortunately, managing risk is getting more complex every day. Bad actors have adopted their own organizational structure complete with HR, recruiting, training, finance, operations, and development teams. And worse? They use the same tools that the IT community knows and loves.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;&lt;font&gt;Some of the go-to-market strategies for cyber criminals involve outsourcing, brokering software, and forming partnerships with other vendors. The web of cyber connectivity that has been woven is extraordinary and has evolved into a professional ecosystem that allows them to attack with impunity. As a result, stronger risk management practices are needed now more than ever. The&lt;/font&gt; &lt;a href="https://www.nist.gov/risk-management" target="_blank"&gt;&lt;font color="#1155CC"&gt;National Institute of Standards and Technology (NIST)&lt;/font&gt;&lt;/a&gt;&lt;font&gt;, indicates that 93 percent of intentional breaches in 2021 were financially motivated, with only six percent of reported incidents attributed to espionage.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;So how do organizations protect themselves against such an intricate ring of cybercrime on a global scale?&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;&amp;nbsp;&lt;img src="https://www.technologyfirst.org/resources/Pictures/ATC%20Image.jpg" alt="" title="" border="0" width="363" height="228"&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000"&gt;&lt;strong&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;The Cost of Cyberattacks on a Global Scale&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;&lt;font&gt;Globally, the average cost of a data breach increased by 10 percent in 2021, reaching $4.3 million, up from $3.8 million in 2020, according to a recent&lt;/font&gt; &lt;a href="https://www.ibm.com/reports/data-breach" target="_blank"&gt;&lt;font color="#1155CC"&gt;data breach report&lt;/font&gt;&lt;/a&gt; &lt;font&gt;conducted by IBM and the Ponemon Institute. The U.S. has continually ranked at the top of the list for costs, increasing from $8.6 million in 2020 to $9 million in 2021. With the cost of breaches on the rise, it’s no surprise that spending on security technology is on the rise as well.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;&lt;font&gt;Worldwide spending on information security and risk management technology and services is expected to skyrocket in the next few years. According to a&lt;/font&gt; &lt;a href="https://venturebeat.com/security/2022-cybersecurity-forecasts-predict-growth-emphasizing-resilience/#:~:text=Gartner%20predicts%20end%2Duser%20spending,(CAGR)%20of%2011%25." target="_blank"&gt;&lt;font color="#1155CC"&gt;Venturebeat cybersecurity forecast&lt;/font&gt;&lt;/a&gt;&lt;font&gt;, Gartner predicts end-user spending for the information security and risk management market will grow from $172 billion in 2022 to $267 billion in 2026, attaining a compound annual growth rate (CAGR) of 11 percent. Many businesses are seeking outside aid and partnering with IT consulting firms and cybersecurity experts to help them gain a better understanding of the solutions and services landscape.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000"&gt;&lt;strong&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;Build a Defensible Cybersecurity Posture&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;A sound security strategy provides unified and reliable protection of your assets from potential threats. Today, every business is vulnerable to attack, not just major global brands, and the consequences of being unprepared can be catastrophic. That’s why along with the constant changes in the cybersecurity landscape, there has to be a continuous change in mindset.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;The dialogue around security has evolved as shown below:&lt;/font&gt;&lt;/p&gt;

&lt;ol&gt;
  &lt;li&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;Organizations ask, “What &lt;em&gt;if&lt;/em&gt; we are targeted?”&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;Organizations ask, “Are we ready for &lt;em&gt;when&lt;/em&gt; they attack?”&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;Organizations are now asking, “Assuming we’ve already been compromised and don’t know it yet, how can we beef up our cybersecurity posture?”&lt;/font&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;&lt;span style="background-color: white;"&gt;&lt;font&gt;As the digital footprint of organizations expands, centralized cybersecurity control becomes obsolete. If you’re not looking into encrypted network traffic, you won’t have security.&lt;/font&gt;&lt;/span&gt; &lt;font&gt;This shift in mindset is the fundamental principle that drives the concept of zero trust.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000"&gt;&lt;strong&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;Zero Trust: What and Why You Need It to Protect Your Business&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;&lt;font&gt;Protecting the modern business requires a new approach to security, and many are turning to zero trust. A cloud-native zero-trust platform is built on a proxy-based architecture that sits between the user and the Internet to provide secure access with full SSL inspection at scale.&lt;/font&gt; &lt;span style="background-color: white;"&gt;&lt;font&gt;The&lt;/font&gt;&lt;/span&gt; &lt;a href="https://en.wikipedia.org/wiki/Zero_trust_security_model" target="_blank"&gt;&lt;span style="background-color: white;"&gt;&lt;font color="#1155CC"&gt;core concept of zero trust&lt;/font&gt;&lt;/span&gt;&lt;/a&gt; &lt;span style="background-color: white;"&gt;&lt;font&gt;is simple: Assume everything is hostile and always verify.&lt;/font&gt;&lt;/span&gt; &lt;span style="background-color: white;"&gt;&lt;font&gt;In a zero trust architecture, a resource’s network location isn’t the biggest factor in its security posture anymore. Your data, workflows, and services are protected by software-defined micro-segmentation, enabling you to keep them secure anywhere; in your data center or in distributed hybrid and multi-cloud environments.&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000"&gt;&lt;span style="background-color: white;"&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;All data must be protected everywhere—on-premises, in the cloud, in SaaS applications, as it travels on the network, etc. To provide the best possible security, organizations should have all their different layers of defense working together while leveraging the cloud, so that when an issue in any layer is uncovered, the rest of the layers will be informed for total protection.&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000"&gt;&lt;span style="background-color: white;"&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;The painful reality is that all organizations are under attack—whether opportunistic or targeted—and the cybersecurity landscape is continually changing while the attack surface increases and the perimeter dissolves. The new paradigm in security is simple: assume the bad guys are in the system and plan accordingly.&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font&gt;&lt;em style=""&gt;&lt;span style="background-color: white;"&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;font color="#000000"&gt;The above submission is compliments of ATC’s Tech Advisor series. Advanced Technology Consulting (ATC) specializes in digital transformation in four core areas; voice, network, cloud, and cybersecurity. In 2023, ATC will be a Technology First annual partner for five years running.&lt;/font&gt; &lt;font color="#099AC6"&gt;For Taste of IT, ATC will be presenting on “SASE, The Edge, and Zero Trust” and exhibiting in booth #11.&lt;/font&gt;&lt;/font&gt;&lt;/span&gt;&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/12971958</link>
      <guid>https://www.technologyfirst.org/Tech-News/12971958</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Wed, 28 Sep 2022 18:37:31 GMT</pubDate>
      <title>It’s No Secret</title>
      <description>&lt;p&gt;&lt;font face="Verdana, sans-serif" color="#000000" style="font-size: 14px;"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Newsletter/Tech%20News%20Blog%20-%20Its%20no%20secret.png" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" color="#000000" style="font-size: 14px;"&gt;You are probably aware that Technology First stands on three pillars: To&lt;/font&gt; &lt;font face="Verdana, sans-serif" style="font-size: 14px;" color="#099AC6"&gt;&lt;strong&gt;Connect&lt;/strong&gt;&lt;/font&gt;&lt;font face="Verdana, sans-serif" color="#000000" style="font-size: 14px;"&gt;,&lt;/font&gt; &lt;font face="Verdana, sans-serif" style="font-size: 14px;" color="#099AC6"&gt;&lt;strong&gt;Strengthen&lt;/strong&gt;&lt;/font&gt;&lt;font face="Verdana, sans-serif" color="#000000" style="font-size: 14px;"&gt;, and&lt;/font&gt; &lt;font face="Verdana, sans-serif" style="font-size: 14px;" color="#099AC6"&gt;&lt;strong&gt;Champion&lt;/strong&gt;&lt;/font&gt; &lt;font face="Verdana, sans-serif" color="#000000" style="font-size: 14px;"&gt;our IT community. What you may wonder is how.&lt;/font&gt;&lt;span style=""&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" color="#000000" style="font-size: 14px;"&gt;We Connect by offering our members numerous opportunities every month to network with peers and industry leaders.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Calibri, sans-serif" style="font-size: 14px;"&gt;&lt;font face="Verdana, sans-serif" style="color: rgb(0, 0, 0);"&gt;We Strengthen by transferring knowledge of industry trends and emerging technology through our two major conferences each year,&lt;/font&gt; &lt;a href="https://www.technologyfirst.org/Taste-of-IT" style=""&gt;&lt;font face="Verdana, sans-serif" style="" color="#F98D43"&gt;&lt;strong&gt;ToIT&lt;/strong&gt;&lt;/font&gt;&lt;/a&gt; &lt;font face="Verdana, sans-serif" style="color: rgb(0, 0, 0);"&gt;and&lt;/font&gt; &lt;a href="https://www.technologyfirst.org/Ohio-Information-Security-Conference" style=""&gt;&lt;font face="Verdana, sans-serif" style=""&gt;&lt;strong&gt;OISC&lt;/strong&gt;&lt;/font&gt;&lt;/a&gt; &lt;font face="Verdana, sans-serif" style="color: rgb(0, 0, 0);"&gt;and working in partnership with both IT consumers and IT providers every day.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" color="#000000" style="font-size: 14px;"&gt;And one way we Champion our technology community is through our volunteer work.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" color="#000000" style="font-size: 14px;"&gt;Last month, Technology First held our 9&lt;sup&gt;th&lt;/sup&gt; annual Golf Outing. The event raises money for the Technology First Scholarship fund. These scholarships are &lt;span style="background-color: white;"&gt;awarded every year to one or more deserving regional college students. So far, we have helped students from Cedarville University, Central State University, Clark State University, Miami University Middletown, Sinclair Community College, University of Dayton, Wilberforce University, Wright State University, Ohio State University and Xavier University. To be selected, students&amp;nbsp;must be currently majoring in Information Technology-related curriculums, achieved distinguished academic success, and demonstrated authentic character and values, among other rigorous criteria. Here is what winning one of the scholarships means to a recipient:&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;font color="#000000" face="Calibri, sans-serif"&gt;&lt;em&gt;&lt;span style="background-color: white;"&gt;&lt;font color="#099AC6" face="Verdana, sans-serif" style="font-size: 14px;"&gt;“Thank you Technology First for your investment in my future as well as the futures of all the other students who received scholarships. The monies will be going directly to my tuition payments to help ease my student debt and make my studies a little lighter”.&amp;nbsp; &amp;nbsp;~ Caleb V.&lt;/font&gt;&lt;/span&gt;&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;font color="#000000" face="Calibri, sans-serif"&gt;&lt;span style="background-color: white;"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 14px;"&gt;Thank you to everyone who participated in this year’s golf outing. See a few photos from the event at the end of this post. Your generosity raised nearly $7,000. This brings our total donations for the past nine years to over $100,000! We could not provide this resource without both your support and the support of our sponsors; &lt;a href="https://www.horizonconnects.com/" target="_blank"&gt;Horizon&lt;/a&gt;, &lt;a href="https://ifnetwork.biz/" target="_blank"&gt;Independents Fiber Network&lt;/a&gt; and &lt;a href="https://www.aunalytics.com/" target="_blank"&gt;aunalytics&lt;/a&gt;.&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Calibri, sans-serif" style="font-size: 14px;"&gt;&lt;span style="background-color: white;"&gt;&lt;font face="Verdana, sans-serif"&gt;And that is not all&lt;/font&gt;&lt;/span&gt; &lt;font face="Verdana, sans-serif"&gt;Technology First does to help students discover their place in the IT industry. This month, we will host the Girl Scouts of Western Ohio (GSWO) for their annual &lt;em&gt;Cyber Challenge&lt;/em&gt;. The purpose of the Challenge is to grow and shape the future of IT in the Dayton region by getting girls excited about careers in cybersecurity. The Cyber Challenge presents the girls with scenarios of cyber breaches. It is a unique event because the Challenge is designed by girls for girls. &amp;nbsp;&amp;nbsp;&lt;span style="background-color: white;"&gt;&lt;font color="#4D5758"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" color="#000000" style="font-size: 14px;"&gt;Then in November, Technology First will participate in the &lt;em&gt;Career Adventure Day&lt;/em&gt; event hosted by the Dayton Metro Library. Partnering with organizations including DRMA, CareSource, SOCHE, Dayton Children’s, and many others, we will promote IT career-path opportunities to middle school students using interactive, engaging, hands-on activities.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Calibri, sans-serif" style="font-size: 14px;"&gt;&lt;font face="Verdana, sans-serif"&gt;It's no secret Technology First is all about promoting awareness that every business is a technology business. We exist to help shape the future of IT. It’s also no secret that you support those purposes too. We are always looking for volunteers to champion these efforts alongside us. You could serve as a committee member, event volunteer, Peer Resource Group leader, or any number of satisfying roles. Please email me at&amp;nbsp;&lt;/font&gt;&lt;a href="mailto:mcutcher@technologyfirst.org" target="_blank"&gt;&lt;font face="Verdana, sans-serif" color="#0563C1"&gt;mcutcher@technologyfirst.org&lt;/font&gt;&lt;/a&gt; &lt;font face="Verdana, sans-serif"&gt;to learn more.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Calibri, sans-serif" style="font-size: 14px;"&gt;&lt;font face="Verdana, sans-serif"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/308563707_501995871933843_3882997623452887805_n.jpg" alt="" title="" border="0"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/308560373_501995661933864_2931206407505092_n.jpg" alt="" title="" border="0"&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Calibri, sans-serif" style="font-size: 14px;"&gt;&lt;font face="Verdana, sans-serif"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/308356397_501995628600534_5690179591415686583_n.jpg" alt="" title="" border="0"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/308677732_501995658600531_431764862706175561_n.jpg" alt="" title="" border="0"&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Calibri, sans-serif" style="font-size: 14px;"&gt;&lt;font face="Verdana, sans-serif"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/308713405_501996095267154_7922568903905822882_n.jpg" alt="" title="" border="0"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/308429065_501996071933823_8089335061350015379_n.jpg" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/12935458</link>
      <guid>https://www.technologyfirst.org/Tech-News/12935458</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Wed, 28 Sep 2022 15:56:28 GMT</pubDate>
      <title>When it Comes to Cybersecurity, Don’t Discount the Basics</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Newsletter/October%20Tech%20News%20Blog.png" alt="" title="" border="0"&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;Let’s face it. Cybersecurity is hard. Between keeping the lights on and the mountain of IT projects, it is tough to stay in the know with current threats. It is common to see organizations attempting to throw software at the problem to stay informed and mitigate risk. However, this approach creates additional challenges. The software requires care and feeding and can produce large amounts of data that someone needs to review and act on. Before long, the software that was supposed to be the answer is just another piece of the enterprise that is getting little attention and presents risks since no one is updating it. While software solutions play a prominent role in understanding your threats and vulnerabilities, organizations should not discount the effectiveness of the basics. &amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;When working with organizations, the three main focus areas are People, Processes, and Technology. Organizations that invest in these three areas typically have an effective defense against cyber threats and are on their way to maturing their cybersecurity programs.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" color="#099AC6" style="font-size: 14px;"&gt;&lt;strong&gt;People:&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;People play a large part in an organization’s cybersecurity defenses. Your employees can be your best defense or your biggest weakness. Cybercriminals are looking for the path of least resistance; usually, people are the most straightforward way into an environment. Implementing a solid training program for your employees is a low-cost way to ensure cybersecurity is top of mind at every level. Look for ways to implement training regularly throughout the year and create a security culture. In addition, the training that employees receive on the job will often help them stay safe at home.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" color="#099AC6" style="font-size: 14px;"&gt;&lt;strong&gt;Process:&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;Processes within an organization ensure everyone is working with the same set of guidelines. Unfortunately, we often encounter organizations with little documentation on the simplest of tasks. Take user on/off-boarding, for example. How many user accounts are still enabled, with the same password in your environment, and the user has been gone over a year? None, you think, but the reality is we encounter this scenario all the time and not just for one or two accounts. A user moved on, and no one notified IT. Documenting processes like this ensures that essential IT functions do not slip through the cracks. This is just one example, but organizations should take a hard look at their internal policy and procedures and, at a minimum, have an Incident Response Plan, Disaster Recovery Plan, and Business Continuity Plan reviewed regularly and practiced yearly.&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" color="#099AC6" style="font-size: 14px;"&gt;&lt;strong&gt;Technology:&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;Technology in terms of cybersecurity is more than what is implemented to protect the environment. Don’t get me wrong, having a firewall implemented and configured correctly is critical, but the attack vector shifts if you are not regularly patching your systems. Organizations are typically good at pushing Microsoft patches; that’s easy. However, software updates and operating system upgrades are a different story. How many Windows 2008, 2003, or Windows 7 machines are running in your environment? Each machine presents a risk and attack vector. Every known vulnerability since the end of support is available to an attacker. Therefore, organizations should consider upgrades as soon as a system is implemented. I often encounter organizations that utilize software and hardware well past their intended end of life. At some point, IT Administrators simply do not want to touch them for fear of breaking something.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;In short, cybersecurity is more than any one piece of software or hardware. Organizations should take a layered approach to cybersecurity and think about solutions in terms of a program. Simply having good cyber hygiene goes a long way in limiting overall risk and attack footprint. By training your people, documenting your processes and procedures, and putting the right technology in place for your organization, you are well on your way to an effective cybersecurity program. &amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;If you are looking for a place to start, we can help.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 12px;"&gt;&lt;em&gt;Chad Robinson is the VP of Advisory and CISO at Secure Cyber Defense in Moraine, OH.&amp;nbsp; In his role, Chad works closely with organizations to develop and mature cybersecurity programs.&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/12935228</link>
      <guid>https://www.technologyfirst.org/Tech-News/12935228</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Mon, 29 Aug 2022 19:55:01 GMT</pubDate>
      <title>AI and the Future of Software Development</title>
      <description>&lt;p style="line-height: 17px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Allen%20Many%20Blog.png" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;Artificial Intelligence (AI) is a growing part of our daily lives. We interact with Siri on our iPhones, we order Amazon products with Alexa and soon we’ll be trusting our cars to safely drive us to our destinations. Now we also have AI helping us write software code by interpreting and delivering solutions by predicting developers’ intention for code. The AI can offer robust code options, complete code snippets, classes, and methods. This is a much more robust contribution and collaboration than a suggested path. It helps you write complete code blocks.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana" color="#F98D43" style="font-size: 14px;"&gt;&lt;strong style=""&gt;How do we get an AI model that writes code for us?&amp;nbsp;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;Artificial Intelligence is the result of repetitive Machine Learning (ML) using a large dataset. A facial recognition AI, for example, is the result of ML pouring over millions of images of human and animal faces. The success and failure to recognize a human face is tracked and shapes the next repetition of testing.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;Similarly, to predict what a developer is going to need for his next line of code the AI would need ML from a large variety of software code. Comparing software code written in different programming languages would also improve the quality of the AI’s code recommendation. GitHub is arguably the largest data store for a variety of software code written in almost every programming language. GitHub has leveraged its vast inclusive content to create an exclusive AI code completion tool called CoPilot.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana" color="#F98D43" style="font-size: 14px;"&gt;&lt;strong style=""&gt;The controversy of using an AI code completion&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;Simple code recommendation tools, like Intellisense, have been part of developer toolkits for decades. A more complete AI-driven service as a software substitute has stirred emotional, ethical, and legal concerns.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;strong style=""&gt;&lt;font color="#F98D43"&gt;Job Threat&lt;/font&gt; &lt;font color="#000000"&gt;-&lt;/font&gt;&lt;/strong&gt; &lt;font color="#000000"&gt;Software development takes education and years of experience to become proficient. Some software developers could look at AI-written code as a threat to their job or that their expertise is being undervalued. When considering an AI tool to write software, be sure to consider the broader impact on morale and the unity of the development team. It may be a good fit for the team and another tool to use. It could also be a source of resentment and dissolve productivity in highly functional teams.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;strong style=""&gt;&lt;font color="#F98D43"&gt;Exclusive Service Created from Inclusive Community Content&lt;/font&gt; &lt;font color="#000000"&gt;-&lt;/font&gt;&lt;/strong&gt; &lt;font color="#000000"&gt;An AI-driven Service as a Software Substitute tool is leveraging available big data to give their AI enough training to be a reliable solution. In his paper ‘Copilot, Copying, Commons, Community, Culture’ Robert F.J. Seddon compares the four conceptions (&lt;/font&gt;&lt;strong style="color: rgb(0, 0, 0);"&gt;i&lt;/strong&gt;&lt;font color="#000000"&gt;) of community written by Peter Dahos - ‘A Philosophy of Intellectual Property” (&lt;/font&gt;&lt;strong style="color: rgb(0, 0, 0);"&gt;ii&lt;/strong&gt;&lt;font color="#000000"&gt;). Since GitHub is arguably the largest repository of publicly available software, it is a resource provided by an inclusive community. When the owner of that inclusive content leverages it into a commodity (a product) it becomes an exclusive resource immediately limiting access to the inclusive community.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana" color="#F98D43" style="font-size: 14px;"&gt;&lt;strong style=""&gt;Untested Legal Position on Intellectual Rights&lt;/strong&gt;&lt;/font&gt; &lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;- If you use an AI-powered code completion tool that has a model built from a public, open-source software, how can this AI-created code be used for commercial solutions? Can this code be merged into an enterprise intellectual property?&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;In the July 2021 article ‘Analyzing the Legal Implications of GitHub Copilot’ (&lt;strong style=""&gt;iii&lt;/strong&gt;) the FOSSA team interviewed an Intellectual Property lawyer to get answers to these questions. In this article, the lawyer gave a great example of how Google provides sample content from millions of books it has indexed. It was ruled that Google was not infringing on the copyrighted material because a small sample of the material was made available. Comparing that to a code completion tool, it is not providing a complete body of work, only a small section of it.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;But you should still be cautious using an AI to provide code completion. &lt;em&gt;“I’d caution anyone using Copilot right now to help write code to pay close attention to the nature of Copilot’s suggestions,” Downing says. “To the extent you see a piece of suggested code that’s very clearly regurgitated from another source — perhaps it still has comments attached to it, for example — use your common sense and don’t use those kinds of suggestions.”&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;strong style=""&gt;&lt;font color="#F98D43"&gt;The Future Of AI&lt;/font&gt;&lt;/strong&gt;&lt;br&gt;
&lt;font color="#000000"&gt;The development of AI tools is accelerating at an exponential rate. You can expect it to become more integrated with your personal and work activities. As more samples of big data become available, there are more opportunities to train an AI solution. One prediction I have for an AI tool: A solution that would interrogate an entire enterprise, examining internal file systems, code repositories and network topology then create workflow documentation, offering process improvement recommendations along the way.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana" color="#F98D43" style="font-size: 14px;"&gt;&lt;strong style=""&gt;Conclusion&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font color="#000000" style="font-size: 14px;"&gt;&lt;span style=""&gt;I enjoy pair-programming with another developer but if that’s not an option I would consider an AI tool to get a feeling of collaboration during the development process. For some teams, it could be the support a developer needs to be productive.&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;As a developer, I don’t feel my job is at risk from AI-written code because there is high demand for skilled developers. I see it as a tool, similar to Intellisense, that would help me get the job done.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;I know AI-written code raises moral concerns around inclusive vs. exclusive communities. The developer community needs to guard against abusive behavior from companies commoditizing on open and inclusive resources.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;&lt;strong style=""&gt;References&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 11px;"&gt;&lt;strong&gt;(i)&lt;/strong&gt; Copilot, Copying, Commons, Community, Culture&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 11px;"&gt;by Robert F.J. Seddon, honorary fellow of University of Durham&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 11px;"&gt;https://www.fsf.org/licensing/copilot/copilot-copying-commons-community-culture&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 11px;"&gt;&lt;strong&gt;(ii)&lt;/strong&gt; Drahos, Peter. A Philosophy of Intellectual Property. 1996, Dartmouth, pp. 67-70&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 11px;"&gt;https://www.researchgate.net/publication/304514536_A_Philosophy_of_Intellectual_Property&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;strong style="font-size: 11px; font-family: Verdana;"&gt;&lt;font color="#000000"&gt;(iii)&lt;/font&gt;&lt;/strong&gt; &lt;font color="#000000" style="font-size: 11px;"&gt;“Analyzing the Legal Implications of GitHub Copilot” - FOSSA 7/14/2021&lt;/font&gt;&lt;br&gt;&lt;/p&gt;&lt;font face="Verdana" style="font-size: 11px;"&gt;&lt;font color="#000000" style=""&gt;https://fossa.com/blog/analyzing-legal-implications-github-copilot/&lt;/font&gt;&lt;/font&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/12899939</link>
      <guid>https://www.technologyfirst.org/Tech-News/12899939</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Mon, 29 Aug 2022 19:09:22 GMT</pubDate>
      <title>Why Software is STILL Eating the World</title>
      <description>&lt;ul&gt;
  &lt;li style="list-style: none; display: inline;"&gt;
    &lt;p style="line-height: 22px;"&gt;&lt;font face="Times New Roman, serif" color="#000000"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Don%20Kennedy%20Blog.png" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li style="list-style: none; display: inline;"&gt;
    &lt;p style="line-height: 22px;"&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;font color="#000000"&gt;As we near the end of the third quarter of 2022, it would not be an understatement to say the state of the software development industry remains red hot across the U.S. As I considered how to capture some of that momentum and provide some insight into something as large and complex as the state of software development I was reminded of an important article from the past. On August 20, 2011, Marc Andreesen published a piece in the Wall Street Journal that for many in the business and technology world would become a rallying cry, “Why Software is Eating the World”. In this article, he focused on what many were not as sure of then, as we are today, which is the impact software, software companies, and the start-up companies of that day would forever change the world in which we live and the businesses that many of us work for. (This article can still be found reprinted on his website, a16z.com) The insights still very much hold up today in 2022 which is why I will use it to frame up the current state of software development here in the Midwest as well as across most of the world. Here are just a few of the insights from that article that hold relevance for us in 2022.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;p style="line-height: 22px;"&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;font&gt;&lt;em&gt;&lt;span&gt;&lt;font color="#099AC6"&gt;“We are in the middle of a dramatic and broad technological and economic shift in which software companies are poised to take over large swathes of the economy.”&lt;/font&gt;&lt;/span&gt;&lt;/em&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;p style="line-height: 22px;"&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;font&gt;&lt;em&gt;&lt;span&gt;&lt;font color="#099AC6"&gt;“Software is also eating much of the value chain of industries that are widely viewed as primarily existing in the physical world.”&lt;/font&gt;&lt;/span&gt;&lt;/em&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;p style="line-height: 22px;"&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;font&gt;&lt;em&gt;&lt;span&gt;&lt;font color="#099AC6"&gt;“Many people in the U.S. and around the world lack the education and skills required to participate in the great new companies coming out of the software revolution.”&lt;/font&gt;&lt;/span&gt;&lt;/em&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;p style="line-height: 22px;"&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;font face="Calibri, sans-serif"&gt;&lt;font face="Verdana, sans-serif" style=""&gt;Is it hard to imagine that Apple, Amazon, and Alphabet are far from done taking over large swathes of the economy in 2022? While it is still early in the value shift from physical world to virtual we have plenty of samples of this evolution to reference in the last eleven years. FedEx, is now thought of more as a software network that happens to have trucks, planes and distribution hubs attached as an example. How many more physical value chains of industries do you experience weekly that are still in need of a little software revolution?&lt;/font&gt; &lt;font face="Arial, sans-serif" style=""&gt;​&lt;/font&gt;&lt;font face="Verdana, sans-serif" style=""&gt;Lastly,&amp;nbsp;&lt;/font&gt;&lt;font face="Arial, sans-serif" style=""&gt;​&lt;/font&gt;&lt;font face="Verdana, sans-serif" style=""&gt;we can still see in&lt;/font&gt; &lt;font face="Arial, sans-serif" style=""&gt;​&lt;/font&gt;&lt;font face="Verdana, sans-serif" style=""&gt;today's&amp;nbsp;&lt;/font&gt;&lt;font face="Arial, sans-serif" style=""&gt;​&lt;/font&gt;&lt;font face="Verdana, sans-serif" style=""&gt;news&lt;/font&gt; &lt;font face="Arial, sans-serif" style=""&gt;​&lt;/font&gt;&lt;font face="Verdana, sans-serif" style=""&gt;headlines&amp;nbsp;that Mr.&lt;/font&gt; &lt;font face="Verdana, sans-serif" style=""&gt;Andreesen’s concerns&lt;/font&gt; &lt;font face="Arial, sans-serif" style=""&gt;​&lt;/font&gt;&lt;font face="Verdana, sans-serif" style=""&gt;about the&lt;/font&gt; &lt;font face="Verdana, sans-serif" style=""&gt;lack of education and skills required to participate in the evolving often software centric economy remains a pressing concern.&lt;/font&gt; &lt;font face="Verdana, sans-serif" style=""&gt;While those headlines are often about security and privacy issues related to software, they also often highlight the challenges around education and skills gaps in many communities and often across a wide spectrum of people from the youngest to the oldest and the richest to the poorest.&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

    &lt;p style="line-height: 22px;"&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;font color="#000000"&gt;&lt;span&gt;&lt;font color="#4B5058"&gt;Here are some additional data points on just the education and skills area and why the last eleven years may have only been the first course in eating the world. This data also provides insight, that even bigger opportunities and challenges lay ahead for software and software development.&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li style="list-style: none; display: inline"&gt;
    &lt;ul&gt;
      &lt;li&gt;&lt;span&gt;&lt;font style="font-size: 14px;"&gt;&lt;em&gt;A shortage of experienced developers continues&lt;/em&gt;&lt;/font&gt;&lt;/span&gt;&lt;/li&gt;
    &lt;/ul&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;font style="font-size: 14px;"&gt;In May of this year, the US Bureau of Labor Statistics showed that employer job postings for tech roles reached "a record high", led by new hiring in IT services and software development. Year over year through this same time there was a 52% increase in postings for tech roles with Full Stack Engineers among the most popular title.&lt;/font&gt;
&lt;/blockquote&gt;

&lt;div style="margin-left: 2em"&gt;
  &lt;ul&gt;
    &lt;li&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;span&gt;&lt;font color="#4B5058"&gt;&lt;em&gt;Salaries balloon&lt;/em&gt;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;font style="font-family: Verdana; font-size: 14px;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/font&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;blockquote&gt;
  &lt;font style="font-size: 14px;"&gt;Year over Year salary increases through the first half of 2022 remain on a growth fast track. Depending on what part of the US you are living, Hire.com and other sources report salary increases ranging from 7-14% year over year increase and on top of just as robust increases in 2021.&lt;/font&gt;
&lt;/blockquote&gt;

&lt;div style="margin-left: 2em"&gt;
  &lt;ul&gt;
    &lt;li&gt;&lt;font face="Verdana" style="font-size: 14px;"&gt;&lt;span&gt;&lt;font color="#4B5058"&gt;The Great Resignation and Potentially the Great Regret&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;blockquote&gt;
  &lt;font style="font-size: 14px;"&gt;As of July, as many as 26% of the 20 million Americans who quit their jobs in the first five months of this year say they regret that decision according to many surveys. While the numbers for software development I would assume may be lower here given the white-hot salary numbers, it’s a trend to watch also in this space. Given the large, recent layoffs and hiring freezes within technology companies, could there be a Great Regret creeping into the software labor force?&lt;/font&gt;
&lt;/blockquote&gt;

&lt;p style="line-height: 24px;"&gt;&lt;font color="#4B5058" face="Verdana" style="font-size: 14px;"&gt;I would like to end with this thought as we sit here in August of 2022. Software is a broad and reaching subject that we all should continue to seek to understand not only from the business perspective. Better understanding how the new generation of developers and technology companies are doing what they do, to what the broader consequences are for businesses and the economy all will remain important investments of our time. By better understanding these and other areas of this layer of the technology industry can we help ensure not only the health of our industry and that of our business community, but also to help ensure better participation for all that it will impact.&lt;/font&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/12899916</link>
      <guid>https://www.technologyfirst.org/Tech-News/12899916</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Mon, 29 Aug 2022 17:29:23 GMT</pubDate>
      <title>3 People-Focused Ways to Increase Dev Capacity, Without Hiring</title>
      <description>&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana, sans-serif" color="#000000" style="font-size: 14px;"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Rih%20Theil%20Blog%20V2.png" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana, sans-serif" color="#000000" style="font-size: 14px;"&gt;As many businesses approach budget season, the truth rears its ugly head again – the business needs 15 projects completed in the next year and the team has capacity for 8. So, you get together with business leaders, you prioritize, make half the room angry, and then because you’ve committed so much, your teams have little-to-no chance of actually delivering the projects you’ve outlined. This painful process repeats itself every year.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana, sans-serif" color="#000000" style="font-size: 14px;"&gt;The good news is that this isn’t unique to your business. This pattern repeats itself across nearly every IT and development organization. The frustration mounts the same way in nearly every business leader. The math simply does not work –&amp;nbsp;the work exceeds the capacity.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana, sans-serif" color="#000000" style="font-size: 14px;"&gt;So, we try bonus structures and tightening down the screws but none of it works for long. And of course, we want to hold off on hiring so we need a different approach.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana, sans-serif" color="#000000" style="font-size: 14px;"&gt;Fortunately, there are some things you can do, so let’s get started:&lt;/font&gt;&lt;/p&gt;

&lt;h2 style="line-height: 25px;"&gt;&lt;font face="Verdana, sans-serif" color="#000000" style="font-size: 14px;"&gt;&lt;strong&gt;1. Master Motivation&lt;/strong&gt;&lt;/font&gt;&lt;/h2&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana, sans-serif" color="#000000" style="font-size: 14px;"&gt;Something like 60% of all corporate employees are disengaged. No org is immune. This statistic gets cited all the time and shows up in a number of articles. Here’s &lt;a href="https://www.gallup.com/workplace/313313/historic-drop-employee-engagement-follows-record-rise.aspx" target="_blank"&gt;&lt;font color="#1155CC"&gt;one that discusses a 38% engagement rate&lt;/font&gt;&lt;/a&gt;. It’s a pervasive and hidden issue, so let’s try to make it more tangible:&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana, sans-serif" color="#000000" style="font-size: 14px;"&gt;An engagement rate of 38% on a team of 25 people means that 9.5 people are fully engaged.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana, sans-serif" color="#000000" style="font-size: 14px;"&gt;If the engagement rate increases just 8 points (46%), it means 11.5 people are fully engaged.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana, sans-serif" color="#000000" style="font-size: 14px;"&gt;That’s the equivalent of hiring 2 people!&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana, sans-serif" color="#000000" style="font-size: 14px;"&gt;Author, Daniel Pink wrote an incredible book on engagement titled “Drive”, that’s a must-read for every leader responsible for engineering teams. Pink’s research showed that humans aren’t motivated by money nearly as much as by having Autonomy, Mastery, and Purpose in their work. When we create environments where people have autonomy, mastery, and purpose, we create environments that lead to engagement. How do we do this?&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font color="#000000" face="Arial, sans-serif"&gt;&lt;em&gt;&lt;font face="Verdana, sans-serif" style="font-size: 14px;"&gt;Autonomy&lt;/font&gt;&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana, sans-serif" color="#000000" style="font-size: 14px;"&gt;Leaders who excel at creating autonomy focus on two things: &lt;em&gt;trust and courage&lt;/em&gt;. Trust in your team to let them make tech and product decisions in their local context, without significant oversight from you (or another leader). Then, the courage to stick through it and let them make a mistake. It’s like the first time you let your 16-year-old drive on the highway by themselves (a reality in my life right now). Autonomy takes trust and courage.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font color="#000000" face="Arial, sans-serif"&gt;&lt;em&gt;&lt;font face="Verdana, sans-serif" style="font-size: 14px;"&gt;Mastery&lt;/font&gt;&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana, sans-serif" color="#000000" style="font-size: 14px;"&gt;Excelling at mastery requires &lt;em&gt;investment&lt;/em&gt;. Financial investment helps, but this one is really about time. Investing time every quarter to allow teams to develop skills (in a SAFe environment, this might be during the IP sprint). Throughout the year, encourage people to take on some new tech and then encourage pairing with someone who already knows the tech. They’ll be slower at first, but as skills develop, you’ll have two people that are masters at the new tech and the org will be twice as fast.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font color="#000000" face="Arial, sans-serif"&gt;&lt;em&gt;&lt;font face="Verdana, sans-serif" style="font-size: 14px;"&gt;Purpose&lt;/font&gt;&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font color="#000000" face="Arial, sans-serif"&gt;&lt;font face="Verdana, sans-serif" style="font-size: 14px;"&gt;Why do people work for your organization? To make money for the business? Doubtful. Making money for the org just doesn’t motivate most people. To make money for themselves? Again, doubtful – you’re probably already paying your engineers more than the money required for happiness (&lt;a href="https://www.fox9.com/news/heres-how-much-money-you-need-to-make-to-be-happy-living-in-the-us-according-to-study" target="_blank"&gt;&lt;font color="#1155CC"&gt;that number is currently $95,000&lt;/font&gt;&lt;/a&gt;).&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana, sans-serif" color="#000000" style="font-size: 14px;"&gt;People’s deepest purpose is to help others. Purpose provides us with the good feeling of having made the world a better place.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana, sans-serif" color="#000000" style="font-size: 14px;"&gt;There are two keys to driving purpose: Stories, and Frequency. We must share authentic, believable stories about how our work improves the world and then we must talk about them frequently. Stories are the currency of Purpose.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana, sans-serif" color="#000000" style="font-size: 14px;"&gt;If you work at a bank, it’s tempting to talk about revenue, but it’s more motivating to talk about helping a family achieve the dream of owning a home by providing a mortgage for them.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana, sans-serif" color="#000000" style="font-size: 14px;"&gt;If you work at a Consumer Goods company, it might be easy to talk about sales goals, but it’s more motivating to share stories of moms who struggled before using your product and now have a changed life because of it.&lt;/font&gt;&lt;/p&gt;

&lt;h2 style="line-height: 25px;"&gt;&lt;font face="Verdana, sans-serif" color="#000000" style="font-size: 14px;"&gt;&lt;strong&gt;2. Become a Culture Curator&lt;/strong&gt;&lt;/font&gt;&lt;/h2&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana, sans-serif" color="#000000" style="font-size: 14px;"&gt;We all know that “culture eats strategy for breakfast” but if we look at the past 6 weeks and are honest with ourselves, how much effort have we put into culture? How much to strategy? We have to wonder if the focus on strategy is ruining the breakfast.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana, sans-serif" color="#000000" style="font-size: 14px;"&gt;The number one job of every leader in a development organization is to create and curate a culture. Every word, every thought, every idea you have should propel the culture in a direction that helps to accomplish the goals of the organization. If the culture needs to be more entrepreneurial, then immersing yourself in the entrepreneurial culture of startup software companies and reflecting that in decisions you make must become a core part of the way you operate.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana, sans-serif" color="#000000" style="font-size: 14px;"&gt;Leaders’ roles are to eat, sleep, and breathe the culture we’d like to see embodied in our organization. The more we do that, the more we’ll create that culture in our people and our companies.&lt;/font&gt;&lt;/p&gt;

&lt;h2 style="line-height: 25px;"&gt;&lt;font face="Verdana, sans-serif" color="#000000" style="font-size: 14px;"&gt;&lt;strong&gt;3. Become a Servant-Leader&lt;/strong&gt;&lt;/font&gt;&lt;/h2&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana, sans-serif" color="#000000" style="font-size: 14px;"&gt;Scrum and Agile flipped the script on leadership and it makes the world a significantly better place. Leaders who serve their teams win their hearts, gain their trust, and build more committed teams. As a senior leader, this is what servant-leadership looks like:&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font color="#000000" face="Arial, sans-serif" style="font-size: 14px;"&gt;&lt;font face="Verdana, sans-serif"&gt;●&lt;font face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/font&gt; &lt;font face="Verdana, sans-serif"&gt;Asking your teams what help looks like and then doing that for them.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font color="#000000" face="Arial, sans-serif" style="font-size: 14px;"&gt;&lt;font face="Verdana, sans-serif"&gt;●&lt;font face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/font&gt; &lt;font face="Verdana, sans-serif"&gt;Starting every meeting by asking for the room’s thoughts on what should be covered (instead of driving your own agenda)&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font color="#000000" face="Arial, sans-serif" style="font-size: 14px;"&gt;&lt;font face="Verdana, sans-serif"&gt;●&lt;font face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/font&gt; &lt;font face="Verdana, sans-serif"&gt;Coaching an employee who shows that they need it and welcomes it.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 17px;"&gt;&lt;font face="Verdana, sans-serif" color="#000000" style="font-size: 14px;"&gt;It may take some time but mastering motivation, curating culture, and becoming a servant leader are very effective ways to increase development capacity. Along the way, you’ll become a better leader and create an even more high-performing organization.&lt;/font&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/12899833</link>
      <guid>https://www.technologyfirst.org/Tech-News/12899833</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Wed, 27 Jul 2022 23:01:24 GMT</pubDate>
      <title>Got Talent?</title>
      <description>&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana" style="font-size: 16px;" color="#F98D43"&gt;&lt;strong&gt;By: Cassie Barlow, President, SOCHE&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 12px;"&gt;The times are changing in the world of talent attraction and management…..has anyone noticed?&amp;nbsp; Who hasn’t seen a help wanted sign in the last few weeks? We have all noticed the changes and we are also all trying to figure out how we can recraft our workforce strategy in response.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 12px;"&gt;The experts in the field of talent, workforce and organizational development are all trying to understand the needs of employers and employees while examining best practices in order to offer the best ways to engage and retain talent.&amp;nbsp; Here are a few thoughts on what is trending in the field and some tips that may help your company find the workforce that you need and keep them engaged and on the job for many years.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 12px;"&gt;If you are one of the companies who have lost great talent over the last 18 months, join the club.&amp;nbsp; The loss of this talent along with the dearth of new talent in the marketplace has led many employers to take a very close look at their workforce strategy, organizational design, structure, salaries, benefits, and job descriptions. Now is the time to examine your internal talent, organizational structure and design and figure out what are the most important tasks that need to be accomplished and the best way to group these tasks into job descriptions. This is also a great time to examine the diversity of your current team and develop some intentional steps to attract and recruit a more diverse group of employees. The research on team performance has indicated repeatedly that team effectiveness, innovation and efficiency improve with diverse teams.&amp;nbsp; There may be opportunities in your company to upskill current employees, to combine job descriptions, to rescope job descriptions, to staff positions with employees at a different level and to look at outsourcing.&amp;nbsp; This is an important first step before trying to operate in the same way that you did a few years ago.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 12px;"&gt;Attracting and hiring new employees is just one part of the talent equation. The trends in employee engagement and retention are also a different landscape from previous years. Professional development is a critical focus area for many employers and an expectation from employees.&amp;nbsp; From internal company transfers and upskilling to paying for degrees and certifications to microlearning, your future employees are looking for ways to continue their development in their new company.&amp;nbsp; Professional development is a wonderful way to engage your employees.&amp;nbsp; Another way to engage your employees is through regular team building and community service. A team becomes their best when they know each other, and both of these activities can boost your team performance as well as build your company culture.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 12px;"&gt;Now let’s switch our focus to keeping our employees on the team!&amp;nbsp; Employees want a sense of purpose at work.&amp;nbsp; They want to truly understand the value and the meaning of your company's mission and vision.&amp;nbsp; They also want to know exactly where they fit into your strategy.&amp;nbsp; Meaningful work and a sense of purpose will encourage employees to stay with you.&amp;nbsp; In addition, employees want to know that they are being paid a competitive wage and benefits.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 12px;"&gt;Take the time to conduct company climate surveys, to listen to your employees and to take action to address concerns.&amp;nbsp; Your employees need to know that you care about them and that you are doing your best to provide them with the tools they need to accomplish their job, while looking out for their best interests.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 12px;"&gt;Remember that we are all in these challenging times together.&amp;nbsp; As a leader in your organization, take time to connect via professional organizations and learn from each other.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 12px;"&gt;Resources:&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;a href="https://bit.ly/TandEmployee" target="_blank"&gt;&lt;font face="Verdana" style="font-size: 12px;"&gt;https://bit.ly/ForneyTalentAquisition&lt;/font&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;a href="https://bit.ly/ForbesHiringTrends" target="_blank"&gt;&lt;font face="Verdana" style="font-size: 12px;"&gt;https://bit.ly/ForbesHiringTrends&lt;/font&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;a href="https://bit.ly/TandEmployee" target="_blank"&gt;&lt;font face="Verdana" style="font-size: 12px;"&gt;https://bit.ly/TandEmployee&lt;/font&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;a href="https://bit.ly/DeloitteHumanTrends" style="" target="_blank"&gt;&lt;font&gt;&lt;font face="Verdana" style="font-size: 12px;"&gt;https://bit.ly/DeloitteHumanTrends&lt;/font&gt;&lt;/font&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;a href="https://deloitte.wsj.com/articles/rethinking-the-employer-employee-relationship-01628713534?icid=learn_more_content_click" style="" target="_blank"&gt;&lt;font&gt;&lt;font face="Verdana" style="font-size: 12px;"&gt;https://bit.ly/deloitteRethinkingRelationships&lt;/font&gt;&lt;/font&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;br&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" face="Calibri, sans-serif" style="font-size: 16px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" face="Calibri, sans-serif" style="font-size: 16px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/12864737</link>
      <guid>https://www.technologyfirst.org/Tech-News/12864737</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Wed, 27 Jul 2022 22:55:36 GMT</pubDate>
      <title>Meaningful Networking: Inspiring the Future of Tech Leadership</title>
      <description>&lt;p&gt;&lt;font style="font-size: 16px;" color="#000000" face="Calibri, sans-serif"&gt;&lt;font color="#222222" face="Verdana, sans-serif"&gt;In July, &lt;a href="https://technologyfirst.org/Women-4-Technology" target="_blank"&gt;Women 4 Technology&lt;/a&gt; once again hosted an outstanding Meaningful Networking event.&amp;nbsp;&lt;/font&gt;&lt;font face="Verdana, sans-serif"&gt;During the event, women &lt;em&gt;and men&lt;/em&gt; from various industries and technology fields gathered to connect and network. We even had a guest appearance from Treg Gilstorf, our Vice Chair.&amp;nbsp;&lt;/font&gt;&lt;font color="#222222" face="Verdana, sans-serif"&gt;A big thank you to&amp;nbsp;&lt;/font&gt;&lt;a href="https://www.technologyfirst.org/EmailTracker/LinkTracker.ashx?linkAndRecipientCode=Q19yFJKISz%2fInRACXXr8ZEB5cLkN8WbcJbpZGaMYqTqvhsbiTtecTJCZ3lTUFErkSOQibRVU96qExwz%2bY32rKOn%2fvYy6H48Upb2O0rP1ptk%3d"&gt;&lt;font face="Arial, sans-serif"&gt;&lt;font color="#0000FF" face="Verdana, sans-serif"&gt;Brooksource&lt;/font&gt;&lt;/font&gt;&lt;/a&gt;&lt;font color="#222222" face="Verdana, sans-serif"&gt;&amp;nbsp;for powering the event and leading one of our table discussions.&amp;nbsp;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" color="#000000" face="Calibri, sans-serif"&gt;&lt;strong&gt;&lt;font color="#222222" face="Verdana, sans-serif"&gt;Why Women 4 Technology?&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" color="#000000" face="Calibri, sans-serif"&gt;&lt;font color="#222222" face="Verdana, sans-serif"&gt;As Kathy Vogler discussed in her guest blog&amp;nbsp;&lt;/font&gt;&lt;font color="#222222" face="Verdana, sans-serif"&gt;&lt;a href="https://technologyfirst.org/Tech-News/12838400" title="https://technologyfirst.org/sys/website/system-pages/?pageId=18010" target="_blank"&gt;&lt;font color="#0000FF"&gt;Disparity in the Numbers&lt;/font&gt;&lt;/a&gt;&amp;nbsp;last month, women make up only 22.3% of the technology workforce. Our W4T Peer Resource Group aims to help improve those numbers by developing leadership through networking, professional development, and mentoring opportunities.&amp;nbsp;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" color="#000000" face="Calibri, sans-serif"&gt;&lt;font color="#222222" face="Verdana, sans-serif"&gt;At the center of W4T's Meaningful Networking events are table discussions led by industry mentors. These discussions leave participants with tips, strategies, and connections to help solve business challenges, dissect industry trends, and achieve career goals.&amp;nbsp;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" color="#000000" face="Calibri, sans-serif"&gt;&lt;font color="#222222" face="Verdana, sans-serif"&gt;July's discussions delivered on these objectives, inspiring&amp;nbsp;several ah-ha moments that left participants with actionable steps and reading recommendations that can be implemented to positively impact our days, careers, and teams:&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;font style="font-size: 16px;" face="Calibri, sans-serif"&gt;&lt;strong&gt;&lt;font face="Verdana, sans-serif"&gt;Penny McVay&lt;/font&gt;&lt;/strong&gt;&lt;font face="Verdana, sans-serif"&gt;&amp;nbsp;with Great American Insurance Group spotlighted&amp;nbsp;&lt;/font&gt;&lt;font color="#00B0F0" face="Verdana, sans-serif"&gt;Positive thinking and learning: If you think you can’t, you can’t… but if you think you can, you can!&amp;nbsp;&lt;/font&gt;&lt;font face="Verdana, sans-serif"&gt;Penny shared the story of an NBA basketball coach and his approach to recognize and celebrate his team to success. She referenced two books&amp;nbsp;&lt;/font&gt;&lt;a href="https://www.amazon.com/Freedom-Flight-Origins-Mental-Power/dp/1934324280/ref=sr_1_1?crid=1JXDD5ZCX2T3E&amp;amp;keywords=Freedom+Flight+-+The+Origins+of+Mental+Power&amp;amp;qid=1658934186&amp;amp;sprefix=freedom+flight+-+the+origins+of+mental+power+%2Caps%2C298&amp;amp;sr=8-1" title="https://www.amazon.com/Freedom-Flight-Origins-Mental-Power/dp/1934324280/ref=sr_1_1?crid=1JXDD5ZCX2T3E&amp;amp;keywords=Freedom+Flight+-+The+Origins+of+Mental+Power&amp;amp;qid=1658934186&amp;amp;sprefix=freedom+flight+-+the+origins+of+mental+power+%2Caps%2C298&amp;amp;sr=8-1" target="_blank"&gt;&lt;font face="Arial, sans-serif"&gt;&lt;font color="#0000FF" face="Verdana, sans-serif"&gt;Freedom Flight - The Origins of Mental Power&lt;/font&gt;&lt;/font&gt;&lt;/a&gt;&lt;font face="Verdana, sans-serif"&gt;&amp;nbsp;and&amp;nbsp;&lt;/font&gt;&lt;font face="Arial, sans-serif"&gt;&lt;a href="https://www.amazon.com/Culture-Code-Secrets-Highly-Successful/dp/0804176981/ref=sr_1_1?crid=E6MZT6GO1T41&amp;amp;keywords=The+Culture+Code%3A+The+Secrets+of+Highly+Successful+Groups&amp;amp;qid=1658934222&amp;amp;sprefix=the+culture+code+the+secrets+of+highly+successful+groups%2Caps%2C114&amp;amp;sr=8-1" title="https://www.amazon.com/Culture-Code-Secrets-Highly-Successful/dp/0804176981/ref=sr_1_1?crid=E6MZT6GO1T41&amp;amp;keywords=The+Culture+Code%3A+The+Secrets+of+Highly+Successful+Groups&amp;amp;qid=1658934222&amp;amp;sprefix=the+culture+code+the+secrets+of+highly+successful+groups%2" target="_blank"&gt;&lt;font color="#0000FF" face="Verdana, sans-serif"&gt;The Culture Code: The Secrets of Highly Successful Groups&lt;/font&gt;&lt;/a&gt;, and&amp;nbsp;&lt;/font&gt;&lt;font face="Verdana, sans-serif"&gt;one mentee connected these ideas to the book&amp;nbsp;&lt;/font&gt;&lt;a href="https://www.amazon.com/The-ONE-Thing-audiobook/dp/B00FPVS27W/ref=sr_1_1?crid=12RVTPJ4N0VDW&amp;amp;keywords=the+one+thing+the+surprisingly+simple&amp;amp;qid=1658934593&amp;amp;sprefix=The+ONE+Thing%3A+The+sur%2Caps%2C129&amp;amp;sr=8-1" title="https://www.amazon.com/The-ONE-Thing-audiobook/dp/B00FPVS27W/ref=sr_1_1?crid=12RVTPJ4N0VDW&amp;amp;keywords=the+one+thing+the+surprisingly+simple&amp;amp;qid=1658934593&amp;amp;sprefix=The+ONE+Thing%3A+The+sur%2Caps%2C129&amp;amp;sr=8-1" target="_blank"&gt;&lt;font face="Arial, sans-serif"&gt;&lt;font color="#0000FF" face="Verdana, sans-serif"&gt;The ONE Thing: The Surprisingly Simple Truth About Extraordinary&lt;/font&gt;&lt;/font&gt;&lt;/a&gt;&lt;font face="Verdana, sans-serif"&gt;.&amp;nbsp;&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;font style="font-size: 16px;" face="Calibri, sans-serif"&gt;&lt;strong&gt;&lt;font face="Verdana, sans-serif"&gt;Raquelle DeSimone&lt;/font&gt;&lt;/strong&gt;&lt;font face="Verdana, sans-serif"&gt;&amp;nbsp;and&amp;nbsp;&lt;strong&gt;Julia Holocher&lt;/strong&gt;&amp;nbsp;of event-sponsor Brooksource led an exercise to help participants&amp;nbsp;&lt;/font&gt;&lt;font color="#00B0F0" face="Verdana, sans-serif"&gt;Own Your Day: Formula for Owning Your Profession&amp;nbsp;&lt;/font&gt;&lt;font face="Verdana, sans-serif"&gt;based on the book of the same name:&amp;nbsp;&lt;u&gt;&lt;a href="https://www.amazon.com/Own-Day-Own-Your-Life-audiobook/dp/B079GC7F8X/ref=sr_1_1?crid=1D55N23RN5UUF&amp;amp;keywords=Own+the+Day%2C+Own+Your+Life%3A+Optimized+Practices+for+Waking%E2%80%A6&amp;amp;qid=1658934342&amp;amp;sprefix=own+the+day%2C+own+your+life+optimized+practices+for+waking+%2Caps%2C226&amp;amp;sr=8-1-spell" title="https://www.amazon.com/Own-Day-Own-Your-Life-audiobook/dp/B079GC7F8X/ref=sr_1_1?crid=1D55N23RN5UUF&amp;amp;keywords=Own+the+Day%2C+Own+Your+Life%3A+Optimized+Practices+for+Waking%E2%80%A6&amp;amp;qid=1658934342&amp;amp;sprefix=own+the+day%2C+own+your+life+optimized+practices+for" target="_blank"&gt;&lt;font color="#0000FF"&gt;Own the Day, Own Your Life&lt;/font&gt;&lt;/a&gt;&lt;/u&gt;. The three-step exercise focused on defining a mission you believe in, describing how you work effectively, and owning your space.&amp;nbsp;&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;font style="font-size: 16px;" face="Calibri, sans-serif"&gt;&lt;strong&gt;&lt;font face="Verdana, sans-serif"&gt;Andrea Dale&amp;nbsp;&lt;/font&gt;&lt;/strong&gt;&lt;font face="Verdana, sans-serif"&gt;of To the Point Coaching and a W4T veteran, encouraged the mentees at her table to&amp;nbsp;&lt;/font&gt;&lt;font color="#00B0F0" face="Verdana, sans-serif"&gt;Strengthen their Influential Leadership Muscles&amp;nbsp;&lt;/font&gt;&lt;font face="Verdana, sans-serif"&gt;by sharing her insights working with IT leaders.&amp;nbsp;&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;font style="font-size: 16px;" face="Calibri, sans-serif"&gt;&lt;strong&gt;&lt;font face="Verdana, sans-serif"&gt;Ashima Sharma&lt;/font&gt;&lt;/strong&gt;&lt;font face="Verdana, sans-serif"&gt;&amp;nbsp;with CareSource is a continued W4T supporter. In her discussion, Ashima encouraged mentees to&amp;nbsp;&lt;/font&gt;&lt;font color="#00B0F0" face="Verdana, sans-serif"&gt;Define Success for Yourself Before Setting Goals&amp;nbsp;&lt;/font&gt;&lt;font face="Verdana, sans-serif"&gt;through what she has defined as the four p's - people, profit, purpose, and planet.&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;font style="font-size: 16px;"&gt;&lt;font face="Verdana, sans-serif"&gt;And,&amp;nbsp;&lt;strong&gt;Claire Rohan&lt;/strong&gt;, TEKsystems Global Services, discussed&amp;nbsp;&lt;/font&gt;&lt;font color="#00B0F0" face="Verdana, sans-serif"&gt;Driving Business Value and Keeping the Customer at the Center of Everything You Enable&lt;/font&gt;&lt;font face="inherit, serif"&gt;,&lt;/font&gt; &lt;font face="Verdana"&gt;sharing several key takeaways including the move from solution-obsessed to outcome-obsessed; meeting people where they're at; and understanding that value is always determined by the customer. These lessons came from the book&lt;/font&gt;&lt;font face="inherit, serif"&gt;&amp;nbsp;&lt;a href="https://www.amazon.com/Pursuing-Enterprise-Outcomes-Maximizing-Organizations/dp/0998162922/ref=sr_1_1?crid=3FWF4LSS7D6H0&amp;amp;keywords=Pursuing+Enterprise+Outcomes%3A+Maximizing+Business+Value+and&amp;amp;qid=1658933337&amp;amp;sprefix=pursuing+enterprise+outcomes+maximizing+business+value+and%2Caps%2C101&amp;amp;sr=8-1" title="https://www.amazon.com/Pursuing-Enterprise-Outcomes-Maximizing-Organizations/dp/0998162922/ref=sr_1_1?crid=3FWF4LSS7D6H0&amp;amp;keywords=Pursuing+Enterprise+Outcomes%3A+Maximizing+Business+Value+and&amp;amp;qid=1658933337&amp;amp;sprefix=pursuing+enterprise+outcomes+maximizing+" target="_blank"&gt;&lt;font color="#0000FF"&gt;Pursuing Enterprise Outcomes: Maximizing Business Value and Improving Strategy for Organizations and Teams&lt;/font&gt;&lt;/a&gt;.&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" color="#000000" face="Calibri, sans-serif"&gt;&lt;font color="#222222" face="Verdana, sans-serif"&gt;We think Lisa Austin of Great American Insurance Group summed up the event best when she said, "I wasn't sure I would be able to make it tonight; but I am so glad I could! This was a great reminder of how we as IT professionals contribute to our businesses, their vision and mission. The event and conversations were a great motivation to me with thought-provoking topics."&amp;nbsp;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" color="#000000" face="Calibri, sans-serif"&gt;&lt;strong&gt;&lt;font color="#222222" face="Verdana, sans-serif"&gt;If you haven't attended one of these events in the past, you're missing out!&amp;nbsp;&lt;/font&gt;&lt;/strong&gt;&lt;font color="#222222" face="Verdana, sans-serif"&gt;We look forward to you joining us at our next W4T event:&amp;nbsp;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" color="#000000" face="Calibri, sans-serif"&gt;&lt;font color="#222222" face="Verdana, sans-serif"&gt;&lt;a href="https://technologyfirst.org/sys/website/system-pages/?pageId=18008" title="https://technologyfirst.org/sys/website/system-pages/?pageId=18008" target="_blank"&gt;&lt;font color="#0000FF"&gt;Creating an Effective Business Case&lt;/font&gt;&lt;/a&gt;&lt;br&gt;
September 16, 2022&lt;br&gt;
8:30 - 10 a.m.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 15px;" color="#222222" face="Calibri, sans-serif"&gt;&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/12864676</link>
      <guid>https://www.technologyfirst.org/Tech-News/12864676</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Tue, 05 Jul 2022 12:30:37 GMT</pubDate>
      <title>Disparity In The Numbers</title>
      <description>&lt;p&gt;&lt;font color="#F98D43" style="font-size: 14px;"&gt;&lt;strong&gt;By: Kathy Vogler, Expedient Technologies&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;According to the US Bureau of Labor Statistics the rapid rise in women’s participation in the work force was a major development in the labor market during the second half of the 20&lt;sup style=""&gt;th&lt;/sup&gt; century. In 2019, 57.4% of all women participated in the labor force&lt;/font&gt;&lt;font color="#000000" face="Verdana" style="font-size: 15px;"&gt;&lt;sup&gt;1&lt;/sup&gt;.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;It’s become normal for women to contribute to their families’ finances and fill jobs in the marketplace.&amp;nbsp; We celebrate these accomplishments. However, working women still face serious challenges that their male counterparts typically do not: motherhood and childcare, equal pay discrepancies, growth ceiling challenges with fewer leadership opportunities, and industry specific bias.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;Currently only 22.3% of workers in the technology field are women.&amp;nbsp; A few other fields show similar statistics and a woman trying to make a career in these male-dominated industries must face these biases and cultures.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;A simple search of LinkedIn Groups for “women in tech” results in over 1,000 offerings.&amp;nbsp; We are trying! My first female focused group experience was in 2013 with Women of Cisco and I’m proud of Technology First for creating Women 4 Technology in 2015.&amp;nbsp; A more recent group (2018) is CompTIA Advancing Women in Technology.&amp;nbsp; Women in this field understand the challenges. These groups bring together supportive women offering training, guidance, and mentoring.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;&lt;strong&gt;57.4% Overall – 22.3% Technology.&amp;nbsp; Why the disparity in these numbers?&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;Educators have been working on this issue for many years. How can we attract more young girls to choose a technology career?&amp;nbsp; “Start early!” shares Martha Taylor, Sinclair Community College Professor of CS&amp;amp;IT “Provide educational opportunities and career modules to K-6 grade teachers and counselors and bring to top of mind the IT career opportunities.&amp;nbsp; Create programming modules with hands-on projects that will start to build interest in IT for these young women.” And, from Kristin Friend, Senior Partner Development Manager Microsoft “Exposure, exposure, exposure! We need to make sure our STEM programs are designed for and marketed to girls of all ages with women mentors from the technology industry highly engaged with these programs.”&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;I attend a lot of technology focused jobs fairs and the number of young women attending and applying for available technology positions is dismal. Take a look at the crowd at the next technology event you attend, you’ll see the same. &amp;nbsp;A glimmer of hope is that the women who are working in technology are thriving and are willing to help others succeed.&amp;nbsp; The Technology First Peer Group Women 4 Technology currently has 66 active members and quarterly events. We are trying!&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;Intel’s 2021 Diversity and Inclusion Report &lt;sup&gt;2&lt;/sup&gt; shows their goal is to increase representation of women in technical roles to 40% by 2030.&amp;nbsp; Dr. Tarika Barrett, CEO of Girls Who Code hopes to close the gender gap in entry level tech jobs by 2030 &lt;sup&gt;3&lt;/sup&gt; “It’s imperative for leaders to play a bigger part in this effort.&amp;nbsp; Women who do take tech jobs often drop out at age 35.&amp;nbsp; We need to focus on changing hiring practices and changing culture to sustain their careers and get deep and hardwired into the company DNA.&amp;nbsp; Sisterhood continues to shape the lives of women in tech who have been hidden or not recognized.&amp;nbsp; You’ll get stuck but you’ll have this team of support through the sisterhood that will carry you through into the workforce.&amp;nbsp; Be reflective of things that push you out of your comfort zone.&amp;nbsp; If you have a supportive organization or company, you’ll find that scaffolding you’ll need to sustain.”&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;Some important career lessons learned about being female in technology, “You have to demonstrate you have the knowledge to work in IT. It’s important to acquire skills and stay relevant in your field” shares Martha Taylor. And, from Kristin Friend “If you find a job opening that you may not have all of the skillsets per the post, it is ok, still go for it! Men do this all the time, whereas women tend to hold back until they feel they have checked all the requirement boxes. You want to find a job where you can leverage the skillset you have but can also grow and learn to advance your career.”&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 14px;"&gt;Women have come a long way but the fallacy persists that most women would rather not be techie. This change in mindset to offer technical opportunities to young women needs to come from parents, teachers, guidance counselors and course learning mechanisms.&amp;nbsp; To keep the women who choose this path from discouragement, change in mindset needs to happen with the C Suite, HR and employee culture committees.&amp;nbsp; Women bring strength through diversity and will positively impact technology given the opportunity.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 12px;"&gt;We are trying!&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 12px;"&gt;1 &lt;a href="https://www.bls.gov/opub/reports/womens-databook/2020/home.htm" target="_blank"&gt;&lt;font color="#0000FF"&gt;Women in the labor force: a databook : BLS Reports: U.S. Bureau of Labor Statistics&lt;/font&gt;&lt;/a&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 12px;"&gt;2 &lt;a href="https://www.bizjournals.com/bizwomen/news/latest-news/2022/05/intel-2021-diversity-report.html?utm_source=st&amp;amp;utm_medium=en&amp;amp;utm_campaign=nch&amp;amp;ana=e_n_bizwomen_tease" target="_blank"&gt;&lt;font color="#0000FF"&gt;Intel (Nasdaq: INTC) 2021 diversity and inclusion report - Bizwomen (bizjournals.com)&lt;/font&gt;&lt;/a&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 12px;"&gt;3 &lt;a href="https://www.linkedin.com/news/story/girls-who-code-ceo-leans-on-sisterhood-5346636/" target="_blank"&gt;&lt;font color="#0000FF"&gt;https://www.linkedin.com/news/story/girls-who-code-ceo-leans-on-sisterhood-5346636/&lt;/font&gt;&lt;/a&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/12838400</link>
      <guid>https://www.technologyfirst.org/Tech-News/12838400</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Mon, 23 May 2022 18:13:41 GMT</pubDate>
      <title>ANNOUNCING NEW BOARD MEMBERS FOR 2022-2023</title>
      <description>&lt;p&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;" color="#000000"&gt;Technology First announces the election of two new members to its Board of Directors. The newly elected Board members are Karen Kauffman and Kevin Johnson.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;" color="#000000"&gt;Technology First’s Executive Director, Melissa Cutcher, said, “We are so pleased to welcome these two talented individuals. Their unique backgrounds, skills and experiences will make them great additions to our board and the organization”.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;" color="#000000"&gt;NEW BOARD MEMBERS&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" color="#000000" face="Calibri, sans-serif"&gt;&lt;strong&gt;&lt;font face="Verdana, sans-serif"&gt;Karen Kauffman&lt;/font&gt;&lt;/strong&gt;&lt;font face="Verdana, sans-serif"&gt;, Director of information Technology for Precision Strip Inc., which leads the industry in metal processing and technical capabilities.&lt;/font&gt; &lt;font face="Verdana, sans-serif"&gt;Precision Strip has grown to&amp;nbsp;&lt;/font&gt;&lt;font face="Verdana, sans-serif"&gt;15 locations throughout Ohio, Kentucky, Indiana, Alabama, Tennessee, and Michigan. Karen is passionate about innovation and supports Precision Strip as they continue their business through building locations and acquisitions.&lt;/font&gt; &lt;font face="Verdana, sans-serif"&gt;&amp;nbsp;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" color="#000000" face="Times New Roman, serif"&gt;&lt;strong&gt;&lt;font face="Verdana, sans-serif"&gt;Kevin Johnson&lt;/font&gt;&lt;/strong&gt;&lt;font face="Verdana, sans-serif"&gt;,&lt;/font&gt; &lt;font face="Verdana, sans-serif"&gt;Vice President of Information Technology&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" color="#000000" face="Calibri, sans-serif"&gt;&lt;font face="Verdana, sans-serif"&gt;Wright-Patt Credit Union (WPCU) which i&lt;/font&gt;&lt;span style="background-color: white;"&gt;&lt;font face="Verdana, sans-serif"&gt;s a not-for-profit cooperative, where members are owners of the credit union, and therefore share in a portion of the credit union's profits. Kevin supports WPCU by providing&lt;/font&gt;&lt;/span&gt; &lt;span style="background-color: white;"&gt;&lt;font face="Verdana, sans-serif"&gt;strategic and managerial responsibility for WPCU’s information technology division, including financial systems, data warehousing, technical services, IT Security, and Project Management Services.&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" color="#000000" face="Calibri, sans-serif"&gt;&lt;strong&gt;&lt;font color="#099AC6" face="Verdana, sans-serif"&gt;Technology First Board Members&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" color="#000000" face="Calibri, sans-serif"&gt;&lt;strong&gt;&lt;font color="#099AC6" face="Verdana, sans-serif"&gt;Officers:&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;" color="#000000"&gt;Board Chair &lt;strong&gt;-&lt;/strong&gt; Scott McCollum - Sinclair College&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;" color="#000000"&gt;Vice Chair - Treg Gilstorf - Smart Data&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;" color="#000000"&gt;Treasurer - Bryan J. Hogan - Afidence&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" color="#000000" face="Calibri, sans-serif"&gt;&lt;strong&gt;&lt;font color="#099AC6" face="Verdana, sans-serif"&gt;Directors-at-large&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;" color="#000000"&gt;Jim Bradley -Tecomet (Retired)&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" color="#000000" face="Times New Roman, serif"&gt;&lt;font face="Verdana, sans-serif"&gt;Diana Bolden - (Retired)&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;" color="#000000"&gt;Paul Stoddard - Gartner&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" color="#000000" face="Times New Roman, serif"&gt;&lt;font face="Verdana, sans-serif"&gt;Matt Coatney -Thompson Hine LLP&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;" color="#000000"&gt;Gary Ginter - Premier Health&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" color="#000000" face="Times New Roman, serif"&gt;&lt;font face="Verdana, sans-serif"&gt;Lisa Heckler - CareSource&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;" color="#000000"&gt;John Huelsman - Hobart Service&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" color="#000000" face="Times New Roman, serif"&gt;&lt;font face="Verdana, sans-serif"&gt;Don Hopkins - Wright State University&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;" color="#000000"&gt;Don Kennedy - Smart Data&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;" color="#000000"&gt;J.D. Whitlock - Dayton Children’s&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" color="#000000" face="Times New Roman, serif"&gt;&lt;font face="Verdana, sans-serif"&gt;Paul Moorman - ND Paper (Retired)&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;" color="#000000"&gt;Thomas Skill, Ph.D. - University of Dayton&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" color="#000000" face="Times New Roman, serif"&gt;&lt;font face="Verdana, sans-serif"&gt;Kevin Johnson - Wright-Patt Credit Union&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;" color="#000000"&gt;Robin Poffenberger - Washington Centerville Library&lt;/font&gt;&lt;/p&gt;&lt;font style="font-size: 16px;" face="Verdana, sans-serif" color="#000000"&gt;Karen Kauffman - Precision-Strip&lt;/font&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/12790783</link>
      <guid>https://www.technologyfirst.org/Tech-News/12790783</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Mon, 23 May 2022 17:35:34 GMT</pubDate>
      <title>Human-Centered Data Science</title>
      <description>&lt;p&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;&lt;font color="#F98D43"&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;&lt;strong style=""&gt;By: Bill Baez, PhD, Vice President-Strategy, Ascend Innovations&lt;/strong&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" color="#000000" face="Verdana"&gt;Data scientists begin analysis by working to understand the people and data involved before turning any numbers into actionable, data-driven insights. Data science frameworks often begin with an initial step of “Business Understanding”, as seen in the &lt;em&gt;Cross-Industry Standard Process for Data Mining&lt;/em&gt; and Microsoft’s &lt;em&gt;Team Data Science Process&lt;/em&gt;. However, like many analytical fields, data science is often defined using a cold, precise tone, like this one from a recent CIO article:&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 15px;" color="#000000" face="Verdana"&gt;&lt;font style="font-size: 16px;"&gt;“&lt;/font&gt;&lt;em&gt;&lt;font style="font-size: 16px;"&gt;The goal of data science is to construct the means for extracting business-focused insights from data. This requires an understanding of how value and information flows in a business, and the ability to use that understanding to identify business opportunities.&lt;/font&gt;&lt;/em&gt;&lt;font style="font-size: 16px;"&gt;”&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;&lt;font style="font-size: 16px;"&gt;[1]&lt;/font&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" color="#000000" face="Verdana"&gt;And while true, definitions like these often gloss over a fundamental aspect of these data-driven insights – the people using them.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" color="#000000" face="Verdana"&gt;While data science frameworks often focus on the need to understand the business, they lack an emphasis on the individuals faced with problems that require the data scientist’s expertise to solve. To provide great and effective solutions, data scientists must be willing to understand what their users feel about their problems. Data scientists need to first &lt;em&gt;empathize&lt;/em&gt; with their clients.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" color="#000000" face="Verdana"&gt;A growing trend within data science is incorporating elements of &lt;em&gt;design thinking&lt;/em&gt; into data science frameworks. Design thinking has long been used in product development and considers empathy to be the first step where researchers can get a better understanding of the problem users are trying to solve.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" color="#000000" face="Verdana"&gt;Data science is fundamentally a collaborative effort between you and those using your solution. Data scientists that foster a deep interest in understanding the people for whom their products are built, create more effective data-driven products and services than those that deliver a sound technical package. Data scientists must place the same weight on understanding their user’s needs as they do in feature engineering or picking the right machine learning model. Not seeing the problem through the user’s eyes can lead to weeks, if not months, of wasted effort creating a model or dashboard that is ultimately not used.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" color="#000000" face="Verdana"&gt;Historically, data scientists have focused on the technical aspects of a project to improve performance. Improved accuracy is only part of the equation when examining a product’s effectiveness. Increasing a model’s accuracy from 80% to 83% isn’t always the right metric to measure its impact on the problem you set out to solve. You want to find out how often that model or dashboard is being used and in what context. You also want to understand how much the decisions made by the models are acceptable to users, how to build trust in the results, and how your users identify value from your product. The answers to these questions will help data scientists develop solutions that are not only technically right but also effectively right for the people using them. &amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font style="font-size: 16px;" color="#000000" face="Verdana"&gt;&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font style="font-size: 16px;" color="#000000" face="Verdana"&gt;&lt;strong&gt;Bill Baez, PhD, Vice President-Strategy, Ascend Innovations&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font style="font-size: 16px;" color="#000000" face="Verdana"&gt;Bill is currently the VP of Strategy at Ascend Innovations in Dayton, OH. In his role, he works closely with multiple departments to provide socially impactful, data-driven products and services to organizations trying to solve complex community problems.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Verdana"&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 13px;" face="Verdana"&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;&lt;font style="font-size: 13px;"&gt;[1]&lt;/font&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://www.cio.com/article/221871/what-is-data-science-a-method-for-turning-data-into-value.html&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/12790771</link>
      <guid>https://www.technologyfirst.org/Tech-News/12790771</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Mon, 28 Feb 2022 21:25:27 GMT</pubDate>
      <title>Why a 3rd Party Assessment is So Important</title>
      <description>&lt;p style="line-height: 16px;"&gt;&lt;font style="font-size: 15px;" face="Calibri, sans-serif" color="#F98D43"&gt;By Shawn Waldman – CEO – Secure Cyber Defense, Miamisburg, OH&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 15px;" face="Calibri, sans-serif" color="#000000"&gt;I've been in technology for over 25 years, and one of the first things I did in 2009 when Cybersecurity was becoming a thing was to have an external firm evaluate my program. Considering that I didn't &lt;em&gt;have&lt;/em&gt; a program back then, the results were very enlightening. I hired a firm that could look at me through a completely different set of eyes. They didn't know my company or me and came at the task differently.&lt;/font&gt;&lt;span style=""&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 15px;" face="Calibri, sans-serif" color="#000000"&gt;Let's look at some of the many reasons you would want to have this done.&lt;/font&gt;&lt;span style=""&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" color="#000000" face="Times New Roman, serif"&gt;&lt;strong&gt;&lt;font style="font-size: 15px;" face="Calibri, sans-serif"&gt;Insurance&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 15px;" face="Calibri, sans-serif" color="#000000"&gt;First and foremost, we're seeing that many insurance carriers are explicitly asking you to have a 3rd party assessment to renew or obtain coverage. Unfortunately, this leaves the door open for interpretation of how the evaluation is carried out. We recommend using many mainstream compliance frameworks like the CIS Top 18 Controls, NIST 800-171, or the National Cybersecurity Framework. Depending on the maturity of your organization, you might also want to investigate the ISO 27000 set of standards.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" color="#000000" face="Times New Roman, serif"&gt;&lt;strong&gt;&lt;font style="font-size: 15px;" face="Calibri, sans-serif"&gt;Risk Management&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 15px;" face="Calibri, sans-serif" color="#000000"&gt;When I'm talking to potential clients, one of the first things I usually talk about is that no business owner will decide about a significant move in just about anything without having good intelligence and information to support the action. Quite frankly, many company executives and managers are completely unaware of the Cybersecurity risk that might be present. A considerable benefit of the assessment process is that a seasoned and experienced assessor can pivot from the interview and look more profound for risk. What's the most common way risk makes its way into an organization? Change.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" color="#000000" face="Times New Roman, serif"&gt;&lt;strong&gt;&lt;font style="font-size: 15px;" face="Calibri, sans-serif"&gt;Getting a Fresh Look&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 15px;" face="Calibri, sans-serif" color="#000000"&gt;Sometimes, it's just nice to get a second set of eyes on things to see if anything is missed or a different way of doing things. A natural reaction is to resist the need for an assessment because it can be seen as a threat or a sign of distrust. Quite the contrary, actually, in the over ten years I've been doing 3&lt;sup&gt;rd&lt;/sup&gt; party assessments, I can only count on one hand the number of times that someone took it that way. Most companies and IT staff welcome a second set of eyes, especially with Cybersecurity, since most IT staff don't want to take on that expertise.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" color="#000000" face="Times New Roman, serif"&gt;&lt;strong&gt;&lt;font style="font-size: 15px;" face="Calibri, sans-serif"&gt;Compliance Requirements&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 15px;" face="Calibri, sans-serif" color="#000000"&gt;Maybe your organization is required to maintain a certification or requirement for you to perform a contract or business with a customer. In this example, CMMC/DFARS/NIST is a perfect model. Since before the requirements were ratified, Secure Cyber Defense has performed pre-assessment work in this area as the customer's advocate. Although the CMMC rules are in flux (recently reduced from 5 levels down to 3), it's important to monitor new contracts for CMMC notification levels. Until then, make sure you work with a trusted provider who can start working with you through the Plan of Action and Milestones (POAM) and help prepare the System Security Plans (SSP). We recommend all defense contractors continue to work on the DFARS/NIST compliance pieces as regardless of what CMMC does, those components will be required for the foreseeable future.&lt;/font&gt;&lt;strong style="font-size: 16px; color: rgb(0, 0, 0); font-family: &amp;quot;Times New Roman&amp;quot;, serif;"&gt;&lt;font style="font-size: 15px;" face="Calibri, sans-serif"&gt;&amp;nbsp;&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" color="#000000" face="Times New Roman, serif"&gt;&lt;strong&gt;&lt;font style="font-size: 15px;" face="Calibri, sans-serif"&gt;Vendors/Customers Request It&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 15px;" face="Calibri, sans-serif" color="#000000"&gt;Next on the list, you would want a 3rd Party Cyber assessment because vendors and customers may require it. It's not out of the question, and many of you have already been requested to have an external evaluation to keep those relationships. These requests generally surround the increased push for organizations to keep their 3&lt;sup&gt;rd&lt;/sup&gt; party vendors in check (i.e., CIS Control 15 covering service provider management). It's always good to keep a current external assessment on file; we recommend every year or every other year.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" color="#000000" face="Times New Roman, serif"&gt;&lt;strong&gt;&lt;font style="font-size: 15px;" face="Calibri, sans-serif"&gt;Light Threat Hunting&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 15px;" face="Calibri, sans-serif" color="#000000"&gt;Something that we've been doing since the beginning has been doing what we call "light threat hunting." In the course of our assessment, we provide some threat hunts of known and documented threats (like log4j indicators) and communication with countries currently listed on the Office of Foreign Access Control (OFAC) list. Often, this can be a good indicator of a potential threat or evidence of one in history. As you are searching for 3&lt;sup&gt;rd&lt;/sup&gt; party assessment vendors, I would ask about.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" color="#000000" face="Times New Roman, serif"&gt;&lt;strong&gt;&lt;font style="font-size: 15px;" face="Calibri, sans-serif"&gt;Blow the Dust Off Your Policies&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 15px;" face="Calibri, sans-serif" color="#000000"&gt;The policy is still one of the not-so-glamorous parts of managing an IT Department and a Cybersecurity program. Things like an Incident Response Plan, Disaster Recovery, and Business Continuity were all things that were not on the priority list year ago. That being said, we've come across many organizations that have policies but haven't been updated for many years. Assessors can look at the guidelines that you do have and provide some feedback on any changes that might need to be made to make them current.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" color="#000000" face="Times New Roman, serif"&gt;&lt;strong&gt;&lt;font style="font-size: 15px;" face="Calibri, sans-serif"&gt;C-Suite and Boards Take Note&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 15px;" face="Calibri, sans-serif" color="#000000"&gt;Executives in the C-Suite and Boards need to note that not having an external look at your organization can often put you in a blind spot. Like I've said previously, it's not a trust issue, and it's the fact that you can get tunnel vision looking at the same things for many years. Like I've said earlier, this happened to me when I was managing IT. Only when I hired an external firm to look at my organization did I learn that there were processes and information I didn't have about new hardware/software solutions available.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" color="#000000" face="Times New Roman, serif"&gt;&lt;strong&gt;&lt;font style="font-size: 15px;" face="Calibri, sans-serif"&gt;Perform Regular Re-Assessments&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 15px;" face="Calibri, sans-serif" color="#000000"&gt;As indicated in this article, we recommend getting regular assessments and rotating through providers at least every other year, much like you would with penetration testing. The idea behind this is that you will get a completely different perspective and process each time you switch vendors.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" color="#000000" face="Times New Roman, serif"&gt;&lt;strong&gt;&lt;font style="font-size: 15px;" face="Calibri, sans-serif"&gt;In Summary&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 15px;" face="Calibri, sans-serif" color="#000000"&gt;This article has spent a lot of time discussing why you would need to hire a firm to perform a 3&lt;sup&gt;rd&lt;/sup&gt; party Cybersecurity assessment, and I've outlined many of the reasons we do them and some of the components that make up our service. Please spend some time interviewing the firm as one of the most valuable assets of an assessor is their background and experience and their ability to inject their years of expertise into your company.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" color="#000000" face="Times New Roman, serif"&gt;&lt;strong&gt;&lt;span style="background-color: white;"&gt;&lt;font style="font-size: 15px;" face="Calibri, sans-serif"&gt;About Secure Cyber Defense&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/strong&gt;&lt;font style="font-size: 15px;" face="Calibri, sans-serif"&gt;&amp;nbsp;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" color="#000000" face="Times New Roman, serif"&gt;&lt;span style="background-color: white;"&gt;&lt;font style="font-size: 15px;" face="Calibri, sans-serif"&gt;Secure Cyber Defense offers 24/7/365 threat monitoring services, Fortinet hardware, secure email, cybersecurity and compliance consulting, incident response services, and cybersecurity training for businesses and government agencies to protect company data from cyber threats. Offering both installed and "cybersecurity as a service" offerings, we scale custom solutions for any size organization. Secure Cyber Defense is a Premier Fortinet Partner.&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/12631090</link>
      <guid>https://www.technologyfirst.org/Tech-News/12631090</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Mon, 31 Jan 2022 18:57:14 GMT</pubDate>
      <title>Just Adjust</title>
      <description>&lt;p&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;" color="#000000"&gt;&lt;span style="background-color: rgb(255, 255, 255);"&gt;&lt;font color="#DD4A3A"&gt;Mardi Humphreys,&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;span style="background-color: rgb(255, 255, 255);"&gt;&lt;font color="#DD4A3A"&gt;Change Agent, Integration Edge&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;" color="#000000"&gt;Tenacity is when we try something, but if it doesn’t work we try different ways to achieve the same goal. Here’s why and how we should develop tenacity on the job.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Verdana, sans-serif"&gt;Why:&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;" color="#000000"&gt;Tenacity is a hard ability to train, so tenacious employees earn the respect of both their managers and peers. Workers willing to do what is necessary for the business to endure downturns are the&amp;nbsp;&lt;a href="https://www.linkedin.com/pulse/4-reasons-you-should-more-tenacious-john-eades"&gt;&lt;font color="#0066BF"&gt;ones&lt;/font&gt;&lt;/a&gt;&amp;nbsp;who get to keep their jobs. Successful people are tenacious. Doing hard things and seeing them through to completion gives us confidence. We develop mental toughness and keep going when others quit. Most people expect Plan A to work every time, but how often does that really happen? There are 26 letters in the alphabet. Let’s be unafraid to go back to a failed Plan A and revise it to make a Plan B, Plan C, or however many letters it takes to overcome the setback. Let’s learn how to not make the same mistake twice. Making new mistakes is much more fun.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Verdana, sans-serif"&gt;How:&lt;/font&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Perceive failures as experiments: When we think we’ve spent all our energy and ideas on overcoming our obstacle, let’s give it one more&amp;nbsp;try&amp;nbsp;and change the input to achieve a better outcome. Often, the answer lies just beyond what we think we’re capable of.&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Set&amp;nbsp;&lt;a href="http://%28https/mardihumphreys.com/get-s-m-a-r-t/"&gt;&lt;font color="#0066BF"&gt;S.M.A.R.T.&lt;/font&gt;&lt;/a&gt;&amp;nbsp;goals: We’ll filter our responsibilities through them. E.g., if we want to be the team’s SME for JavaScript, how do the tasks on our daily to-do lists get us&amp;nbsp;closer&amp;nbsp;to that goal?&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Identify a coworker as a friendly rival. We’ll find someone who is competing for the same promotion or the same client, etc., and use her as the bar against which we measure our work. Does she know Excel better than us? We can take an online class (many are free with a library card) to increase our knowledge. I call competing with someone who is on my team “&lt;a href="https://www.stitcher.com/podcast/ted/worklife-with-adam-grant/e/59358823"&gt;&lt;font color="#0066BF"&gt;coopetition&lt;/font&gt;&lt;/a&gt;.” (Think Group Round during Hollywood Week on&amp;nbsp;&lt;em&gt;American Idol&lt;/em&gt;). We strive to outperform this person because we admire her success. We can use this as motivational fuel to course correct when we’re struggling. This&amp;nbsp;&lt;a href="/http://(https/journals.sagepub.com/doi/abs/10.1177/0956797617744796"&gt;&lt;font color="#0066BF"&gt;study&lt;/font&gt;&lt;/a&gt;&amp;nbsp;says we succeed when our rival succeeds. We can learn from her mistakes as well as build on her successes.&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;&lt;a href="https://www.jimrohn.com/"&gt;&lt;font color="#0066BF"&gt;Jim Rohn&lt;/font&gt;&lt;/a&gt;&amp;nbsp;said, “You are the average of the five people you spend the most time with.” Let’s hang out with tenacious people: professional groups, friends, family, and people with our job title from other companies. We can also read biographies of tenacious people and study what they did.&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;"&gt;Tenacious people are comfortable with being uncomfortable. If our fear of&amp;nbsp;&lt;a href="http://%28https/mardihumphreys.com/i-am-so-not-ready-for-this/"&gt;&lt;font color="#0066BF"&gt;failure&lt;/font&gt;&lt;/a&gt;&amp;nbsp;is holding us back, let’s do something about it. Let’s sift through the symptoms to get to the root. (Journaling may help us see it easier.) Then take baby steps every day to overcome it.&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;font face="Verdana, sans-serif" style="font-size: 16px;" color="#000000"&gt;Tenacity comes through&amp;nbsp;&lt;a href="http://%28https/www.volusion.com/blog/5-tips-to-stay-tenacious/"&gt;&lt;font color="#0066BF"&gt;practice&lt;/font&gt;&lt;/a&gt;. The bad news is, this means facing adversity over and over again. The good (?!) news is, life gives us plenty of adversity to practice with.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/12462728</link>
      <guid>https://www.technologyfirst.org/Tech-News/12462728</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Mon, 31 Jan 2022 16:56:40 GMT</pubDate>
      <title>Using Libraries for Lifelong Learning</title>
      <description>&lt;p&gt;&lt;font style="font-size: 18px;"&gt;&lt;span data-contrast="auto"&gt;&lt;font&gt;&lt;span data-contrast="auto" style=""&gt;&lt;font color="#ED1C24" face="Verdana"&gt;Robin Poffenberger&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/span&gt;&lt;span style=""&gt;&lt;font color="#ED1C24"&gt;Support Services Manager, Washington-Centerville Public Library&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;span data-contrast="auto"&gt;&lt;font face="Calibri, Calibri_EmbeddedFont, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;Research indicates that people are more likely to use public libraries during childhood, early parenthood, and retirement. Hopefully, some of you have fond memories of attending story time as a child or parent! But what can libraries offer you during the career stage of your life?&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font face="Calibri, Calibri_EmbeddedFont, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li data-leveltext="" data-font="Symbol" data-listid="2" data-aria-posinset="1" data-aria-level="1"&gt;
    &lt;p&gt;&lt;font face="Calibri, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;&lt;font face="Calibri, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;&lt;span data-contrast="auto"&gt;&lt;font face="Calibri, Calibri_EmbeddedFont, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;Keep up to date with technology and business news using newspapers and magazines, available in both physical and digital editions. Many digital editions are always available, ready to read whenever and wherever you are.&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font face="Calibri, Calibri_EmbeddedFont, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li data-leveltext="" data-font="Symbol" data-listid="2" data-aria-posinset="2" data-aria-level="1"&gt;
    &lt;p&gt;&lt;font face="Calibri, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;&lt;font face="Calibri, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;&lt;span data-contrast="auto"&gt;&lt;font face="Calibri, Calibri_EmbeddedFont, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;Sharpen and grow your skills to advance your current career or start a new one. Use your library card to access thousands of free video-based trainings via LinkedIn Learning or Udemy on topics ranging from project management to Microsoft 365 Administration. These resources are also a great way for small businesses to develop their employees.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:270}"&gt;&lt;font face="Calibri, Calibri_EmbeddedFont, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li data-leveltext="" data-font="Symbol" data-listid="2" data-aria-posinset="3" data-aria-level="1"&gt;
    &lt;p&gt;&lt;font face="Calibri, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;&lt;font face="Calibri, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;&lt;span data-contrast="auto"&gt;&lt;font face="Calibri, Calibri_EmbeddedFont, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;Need statistical information to provide justification for a new project? Statista has over 80,000 topics from over 18,000 sources combined in a single platform.&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font face="Calibri, Calibri_EmbeddedFont, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li data-leveltext="" data-font="Symbol" data-listid="2" data-aria-posinset="4" data-aria-level="1"&gt;
    &lt;p&gt;&lt;font face="Calibri, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;&lt;font face="Calibri, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;&lt;span data-contrast="auto"&gt;&lt;font face="Calibri, Calibri_EmbeddedFont, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;Our Reference Librarians can assist you in finding free resources including business-oriented databases to create customer lists, develop and gather competitive intelligence, and investigate industries.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font face="Calibri, Calibri_EmbeddedFont, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li data-leveltext="" data-font="Symbol" data-listid="2" data-aria-posinset="5" data-aria-level="1"&gt;
    &lt;p&gt;&lt;font face="Calibri, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;&lt;font face="Calibri, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;&lt;span data-contrast="auto"&gt;&lt;font face="Calibri, Calibri_EmbeddedFont, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;Working at an international company? Improve communication with your colleagues by learning a new language using online language systems or mobile apps.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font face="Calibri, Calibri_EmbeddedFont, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;ul&gt;
  &lt;li data-leveltext="" data-font="Symbol" data-listid="2" data-aria-posinset="1" data-aria-level="1"&gt;
    &lt;p&gt;&lt;font face="Calibri, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;&lt;font face="Calibri, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;&lt;span data-contrast="auto"&gt;&lt;font face="Calibri, Calibri_EmbeddedFont, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;Catch up on new and best-selling business books. Pick up a physical copy using curbside pickup or download an audio copy to your phone and listen while you commute or exercise.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font face="Calibri, Calibri_EmbeddedFont, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;span data-contrast="auto"&gt;&lt;font face="Calibri, Calibri_EmbeddedFont, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;Lifelong learning isn’t just about professional development. Studies show that we have fewer new experiences as we age, making time feel like it passes more quickly. Taking time for learning activities during your personal time also provides benefits such as helping your brain stay healthy and expanding your thinking. Libraries can help!&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font face="Calibri, Calibri_EmbeddedFont, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li data-leveltext="" data-font="Symbol" data-listid="3" data-aria-posinset="2" data-aria-level="1"&gt;
    &lt;p&gt;&lt;font face="Calibri, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;&lt;font face="Calibri, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;&lt;span data-contrast="auto"&gt;&lt;font face="Calibri, Calibri_EmbeddedFont, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;Enlist your friends and family and test your sleuthing skills with digital escape rooms from the comfort of your own home.&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font face="Calibri, Calibri_EmbeddedFont, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li data-leveltext="" data-font="Symbol" data-listid="3" data-aria-posinset="3" data-aria-level="1"&gt;
    &lt;p&gt;&lt;font face="Calibri, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;&lt;font face="Calibri, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;&lt;span data-contrast="auto"&gt;&lt;font face="Calibri, Calibri_EmbeddedFont, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;Learn new recipes or cooking skills using cookbooks and cooking magazines. Try traditional recipes from around the world using the AtoZ World Food online database or try regional recipes from the U.S. with AtoZ Food America.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font face="Calibri, Calibri_EmbeddedFont, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li data-leveltext="" data-font="Symbol" data-listid="3" data-aria-posinset="4" data-aria-level="1"&gt;
    &lt;p&gt;&lt;font face="Calibri, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;&lt;font face="Calibri, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;&lt;span data-contrast="auto"&gt;&lt;font face="Calibri, Calibri_EmbeddedFont, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;Go back in time to research your family tree using genealogy resources such as Ancestry, Fold 3 and HeritageQuest.&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font face="Calibri, Calibri_EmbeddedFont, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;ul&gt;
  &lt;li data-leveltext="" data-font="Symbol" data-listid="3" data-aria-posinset="1" data-aria-level="1"&gt;
    &lt;p&gt;&lt;font face="Calibri, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;&lt;font face="Calibri, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;&lt;span data-contrast="auto"&gt;&lt;font face="Calibri, Calibri_EmbeddedFont, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;Ready to buy a new car or try repairing your own? Check out Consumer Reports for reviews on new vehicles or tackle vehicle maintenance repairs with help from Chilton Library online.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font face="Calibri, Calibri_EmbeddedFont, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li data-leveltext="" data-font="Symbol" data-listid="3" data-aria-posinset="2" data-aria-level="1"&gt;
    &lt;p&gt;&lt;font face="Calibri, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;&lt;font face="Calibri, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;&lt;span data-contrast="auto"&gt;&lt;font face="Calibri, Calibri_EmbeddedFont, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;Tackle those intimidating home improvement projects with Home Improvement Reference Center.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font face="Calibri, Calibri_EmbeddedFont, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li data-leveltext="" data-font="Symbol" data-listid="3" data-aria-posinset="3" data-aria-level="1"&gt;
    &lt;p&gt;&lt;font face="Calibri, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;&lt;font face="Calibri, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;&lt;span data-contrast="auto"&gt;&lt;font face="Calibri, Calibri_EmbeddedFont, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;Plan your next trip with the help of the library! Get passports and passport photos, foreign language tutorials, travel books and more.&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:270}"&gt;&lt;font face="Calibri, Calibri_EmbeddedFont, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;

  &lt;li data-leveltext="" data-font="Symbol" data-listid="3" data-aria-posinset="4" data-aria-level="1"&gt;
    &lt;p&gt;&lt;font face="Calibri, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;&lt;font face="Calibri, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;&lt;span data-contrast="none"&gt;&lt;font color="#333333" face="Calibri, Calibri_EmbeddedFont, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;Learn to knit, crochet, scrapbook, decorate cakes and more using CreativeBug, an online video tutorial resource. CreativeBug has thousands of award-winning art and craft video classes taught by recognized designers and artists.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font color="#333333" face="Calibri, Calibri_EmbeddedFont, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;span data-contrast="auto"&gt;&lt;font face="Calibri, Calibri_EmbeddedFont, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;If it’s been a while since you visited your local public library, stop in or visit us online to see how we can help you achieve your learning goals.&lt;/font&gt;&lt;/span&gt;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&lt;font face="Calibri, Calibri_EmbeddedFont, Calibri_MSFontService, sans-serif" style="font-size: 15px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/12459029</link>
      <guid>https://www.technologyfirst.org/Tech-News/12459029</guid>
      <dc:creator>Marla Halley</dc:creator>
    </item>
    <item>
      <pubDate>Tue, 04 Jan 2022 16:28:55 GMT</pubDate>
      <title>Leadership Article - Board Chair</title>
      <description>&lt;p&gt;&lt;font color="#DD4A3A"&gt;Scott McCollum, CIO, Sinclair Community College and Chair, Technology First Board of Directors&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;Every IT organization has their “table stakes” products for providing security over their infrastructure. These are the products such as anti-virus, firewalls, and mail scanning gateways that have become ubiquitous and a part of every IT department’s budget. Beyond these common products there are other, more capable products that are implemented in order to address other risks that the organization feels are in need of mitigation. In addition to this inventory of products that have been implemented, I don’t think I’d be going out on a limb to say that every organization, regardless of size or the number of products that are used, has a list of products that they feel would improve their security posture. If this truly is the case, then how do organizations ensure that the products on their “wish list” address their most important vulnerabilities, and how do they get approval for increasing their spend for yet another product to eliminate their remaining vulnerabilities?&lt;/p&gt;

&lt;p&gt;Sorry if you thought I had the answer to this most important question. Unfortunately, the number of vulnerabilities in an organization’s infrastructure are numerous and caused by many different factors. Some are due to bugs in the particular software that the organization uses, some are caused by flawed operational procedures of departmental users, and some are due to misconfiguration of systems. My point is that these issues will always exist and we can’t expect our budgets to continually grow to add more security products. In addition to the vastness of areas where vulnerabilities exist, we are faced with ever-tightening budgets that were already hard to justify increases in prior to the world-wide pandemic that has increased technology support costs while decreasing revenues.&lt;/p&gt;

&lt;p&gt;While we can’t eliminate all vulnerabilities, we must identify those vulnerabilities that pose the greatest risk for the organization and focus on these areas for process improvements and technology acquisition. In some cases this means repurposing of our resources, due to the lack of being able to justify additional funding. This repurposing can manifest itself in many ways. One way to repurpose resources is to eliminate products that don’t attack the greatest threats or to acquire a new product that provides these capabilities in addition to other unmet needs. Another strategy is to implement unused functionality in products that are already owned, but under-utilized. In addition to repurposing tools, there are also opportunities in many cases to repurpose personnel to focus on security functions and to work on improving processes and managing security products.&lt;/p&gt;

&lt;p&gt;The first step to being able to repurpose your security assets is to take an inventory of your environment for all resources that relate to security. This can be hard to do because there are some products that provide security, which are not exclusively security products, such as Microsoft 365. Once you have a total picture of the security inventory you can understand the security spend for your organization and where you might have an opportunity to repurpose resources. Identifying the risk that each of your products addresses allows you to map your “wish list” of additional security capabilities and determine how you might be able to perform any necessary repurposing before you make that much more difficult attempt to justify new funding.&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/12240811</link>
      <guid>https://www.technologyfirst.org/Tech-News/12240811</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Mon, 03 Jan 2022 18:18:22 GMT</pubDate>
      <title>TechCred Applications Open from Jan. 3rd-31st!</title>
      <description>&lt;h4 style="line-height: 28px;"&gt;&lt;/h4&gt;

&lt;p&gt;&lt;font color="#3D7AA9" face="Verdana" style="font-size: 18px;"&gt;Upskill your workforce with TechCred.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 30px;"&gt;&lt;font color="#545454" face="Verdana" style="font-size: 18px;"&gt;No matter what industry you work in, technology is having an impact on the future of your business and the nature of your work. TechCred helps Ohioans learn new skills and helps employers build a stronger workforce with the skills needed in a tech-infused economy. Many of these trainings can be completed online!&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#3D7AA9" face="Verdana" style="font-size: 18px;"&gt;The TechCred application opens on January 3, 2022 and will close on January 31, 2022 at 3:00 p.m.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 23px;"&gt;&lt;font color="#333333" face="Verdana" style="font-size: 18px;"&gt;Businesses applying for TechCred are required to list their Supplier ID Number on the TechCred application. To register as a new supplier or update an existing account with the State of Ohio, visit&amp;nbsp;&lt;a href="https://supplier.ohio.gov/" title="https://supplier.ohio.gov" target="_blank"&gt;&lt;font color="#3D7AA9"&gt;https://supplier.ohio.gov&lt;/font&gt;&lt;/a&gt;&amp;nbsp;and follow the prompts until completed. Once this information has been approved, you will receive a ten-digit State of Ohio Supplier ID number.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 23px;"&gt;&lt;font color="#333333" face="Verdana" style="font-size: 18px;"&gt;&lt;strong&gt;Beginning with Round 12 (January 2022), the following changes have been incorporated into the TechCred program:&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li style="line-height: 29px;"&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Training for approved credentials must start on or after the Effective Date of the Grant Agreement and must be completed by the End Date of the Grant Agreement. The Effective Date of the Grant Agreement will be the first day of the month immediately following the last application period. Costs incurred by the Applicant prior to an award of eligibility and an executed Grant Agreement is done at the Applicant's risk.&lt;/font&gt;&lt;/li&gt;

  &lt;li style="line-height: 29px;"&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;TechCed&amp;nbsp;&lt;strong&gt;Grant Agreements will be incorporated as part of the TechCred application&lt;/strong&gt;. Upon receiving an award announcement, awardees will be directed to log into their application to provide an electronic signature certifying and acknowledging the Grant Agreement, Terms and Conditions, and the Program Guidelines.&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;font color="#DD4A3A" face="Verdana" style="font-size: 18px;"&gt;https://techcred.ohio.gov/wps/portal/gov/techcred/apply&lt;/font&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/12241118</link>
      <guid>https://www.technologyfirst.org/Tech-News/12241118</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Sat, 01 Jan 2022 19:19:32 GMT</pubDate>
      <title>The 7 Technology Trends I’d Like to See in 2022 (and Why They Aren’t Impossible)</title>
      <description>&lt;p&gt;&lt;font color="#DD4A3A"&gt;Mardi Humphreys,&amp;nbsp;&lt;span&gt;&lt;font&gt;Change Agent, Integration Edge&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;7. &lt;strong&gt;Not having to remember my passwords&lt;/strong&gt; – Every year about this time I have to either remember (uh, no) or find (ditto) the username and password I created last year for my annual updates (e.g., insurance renewals) and trainings (i.e., don’t ask). Has this prompted me to keep them in a safe place where I can find them once a year? (Again, uh, no.) When I go through the process of changing them, they are so long and involved (e.g., minimum 14 characters, at least one capital letter, at least 16 numbers, at least 11 special characters, etc.) it’s no wonder I fail to remember them or write them down. Luckily in 2022, &lt;a href="https://www.techradar.com/news/how-far-are-we-from-a-passwordless-future" target="_blank"&gt;Passwordless Authentication&lt;/a&gt; will become more common.&lt;/p&gt;

&lt;p&gt;6. &lt;strong&gt;Virtually trying before buying&lt;/strong&gt; – Warby Parker already does this to a degree with their &lt;a href="https://apps.apple.com/us/app/warby-parker/id1107693363?referrer=singular_click_id%3D0fa093fc-afb6-413d-bd14-f84446d77375" target="_blank"&gt;virtual try-on app&lt;/a&gt;. In 2022, &lt;a href="https://www.makeuseof.com/augmented-reality-ecommerce/" target="_blank"&gt;Augmented Reality&lt;/a&gt; will allow sellers to create realistic 3D models of their products. Since stores’ fitting rooms are still closed (thanks, COVID), I’m looking forward to finally being able to discern if the back pockets on a pair of trousers are deep enough to hold my phones before purchasing them.&lt;/p&gt;

&lt;p&gt;5. &lt;strong&gt;Smaller mobile phone&lt;/strong&gt; – 2022 will see &lt;a href="https://www.forbes.com/sites/bernardmarr/2021/12/07/the-7-biggest-consumer-technology-trends-in-2022/?sh=6058c6af4ea2" target="_blank"&gt;5G normalized&lt;/a&gt;. This means I can get a smaller (and cheaper) mobile because phone processors and graphics chips will become obsolete. My Spotify playlist will be streamed to my phone as if it’s a video feed. It also means I don’t have to be so quick to buy those trousers I mentioned in #6.&lt;/p&gt;

&lt;p&gt;4. &lt;strong&gt;No more colonoscopies&lt;/strong&gt; – Kohler, Toto, and Google are all working on technology around &lt;a href="https://bernardmarr.com/artificial-intelligence-in-your-toilet-yes-really/" target="_blank"&gt;Smart Toilets&lt;/a&gt;. So far, they can monitor health indicators like sugar levels, body temperature, and blood pressure, to name a few. Fingers crossed colonoscopies will soon be extinct.&lt;/p&gt;

&lt;p&gt;3. &lt;strong&gt;Becoming a permanent couch potato&lt;/strong&gt; – by changing his company’s name to Meta and transitioning Facebook to one of its offerings, Mark Zuckerberg is declaring the advent of the &lt;a href="https://www.theverge.com/22588022/mark-zuckerberg-facebook-ceo-metaverse-interview" target="_blank"&gt;metaverse&lt;/a&gt;. Defined by Zuckerberg as an embodied internet where you are in the content, not just viewing it, 2022 seems to be the beginning of a totally immersive environment. (Yes, like &lt;a href="https://www.imdb.com/title/tt0133093/" target="_blank"&gt;The Matrix&lt;/a&gt;. But hopefully, without all the dystopianism.) I look forward to visiting my friends’ Instagram accounts and eating the photos of the food they constantly post.&lt;/p&gt;

&lt;p&gt;2&lt;strong&gt;. My own personal robot servant&lt;/strong&gt; – While I’m integrating into the metaverse, someone (or something) will have to keep an eye on things back here in reality. Sure, a robot can &lt;a href="https://www.pcmag.com/picks/the-best-robot-vacuums" target="_blank"&gt;clean my floors&lt;/a&gt;, but in 2022, I expect to be able to purchase a &lt;a href="https://www.forbes.com/sites/bernardmarr/2021/12/07/the-7-biggest-consumer-technology-trends-in-2022/?sh=6058c6af4ea2" target="_blank"&gt;robot&lt;/a&gt; that will also keep an eye out for burglars, make out my grocery list, and give me the answer to Final Jeopardy.&lt;/p&gt;

&lt;p&gt;1. &lt;strong&gt;Printing my own tiny house&lt;/strong&gt; – In the interest of making my robot servant’s life easier, I’m willing to downsize to a tiny house. (Okay, maybe it doesn’t care, but I do. That’s what makes me so nice.) Given the current housing stock, I may have to &lt;a href="https://www.computer.org/publications/tech-news/trends/2022-report" target="_blank"&gt;3D print&lt;/a&gt; one. The IEEE Computer Society thinks that 2022 will bring a revolution in fabrication for 3D printing. This will allow for the production of designs that, until now, would have been too expensive. Of course, it may take all of 2022 to 3D print my tiny house.&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/12223194</link>
      <guid>https://www.technologyfirst.org/Tech-News/12223194</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Sat, 01 Jan 2022 19:18:41 GMT</pubDate>
      <title>GRAY AREAS OF TECHNOLOGY</title>
      <description>&lt;p&gt;&lt;font color="#DD4A3A"&gt;Kathy Vogler, Communications Manager, Expedient Technology Solutions&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;I’m a member of a fantastic Dayton area technology leads group. We are homegrown and somewhat modeled after the very successful BNI group methodology. We cover technology from A to Z with one person representing each type of technology touch.&amp;nbsp; We are all “in technology” these days and we cover a large swath of technology with much of it residing in Gray Areas.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;So exactly what is a Gray Area?&lt;/p&gt;

&lt;p&gt;A gray area is an often-used analogy to the area of color that exists between black and white, complete opposites.&amp;nbsp; To an artist, gray areas result from ambiguity and rich variations that naturally occur in our environments.&amp;nbsp; It’s been said that the ability to see and think in gray areas is a basic element of intelligence. A price can be expensive or cheap, but the gray area will determine if it’s a reasonable price or a good value.&amp;nbsp; It’s hard to categorize gray areas because often they are unique.&amp;nbsp; I saw this and it is a perfect example: A boat is like a canoe and a kayak without technically conforming to either of those categories. &amp;nbsp;Complex systems, like technology, are literally too complex to model easily.&lt;/p&gt;

&lt;p&gt;Are you a Boat or a Canoe?&lt;/p&gt;

&lt;p&gt;Who says they are in technology?&amp;nbsp; Everyone. &amp;nbsp;Not picking on any particular industry, because most people I know are really awesome people, but unfortunately, there are people who believe they can sell anything to anyone.&amp;nbsp; Do they say “I am a seller of a specific business product or service”? Nope, these days it may sound something like “I work in business technology and help people manage and reduce costs.”&amp;nbsp; And, while this is probably true, it falls into the gray area of technology.&amp;nbsp; Competition is fierce in nearly every business. &amp;nbsp;COVID took a toll on our traditional methods of working. &amp;nbsp;Remote and hybrid working changed things immediately and for the future. Supply chain issues are mounting and making us rethink our strategies.&amp;nbsp; It’s wise for all companies to look deeper into technologies to add to their repertoire. Often, non-technical companies in the traditional sense will acquire a technology team that compliments their existing services and salespeople are compensated for promoting and selling these newly added technologies.&amp;nbsp; The logic is that it’s all technology since everything plugs into the network. &amp;nbsp;I believe it’s critical that we always reflect our actual services and resources to our clients to avoid potential failures on their networks. &amp;nbsp;Businesses completely depend on their technology. &amp;nbsp;There are experts in all areas of business technology, from one extreme to the other and including all of those gray areas.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;What exactly is business technology?&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Simply put, business technology is any form of technology that is integrated directly into the operation of a business. &amp;nbsp;Twenty years ago, when I took a job at a technology company, it was fairly straightforward with infrastructure/hardware at one side of the building and programming/software at the other.&amp;nbsp; Gray area at that time was if your company did both.&amp;nbsp; As our reliance on the internet grew, so did the complexities of technology.&amp;nbsp; Ironically, the dot-com bubble burst at about that same time, but progressive-thinking companies survived and flourished.&amp;nbsp; Voice over IP originated around 1995 and grew to become a business standard.&amp;nbsp; Video communications, fax sharing, integration of copiers and door alarms all made our work experience more efficient by using the internet.&lt;/p&gt;

&lt;p&gt;And of course, the introduction of the indispensable grand champion of smartphones (thank you Steve Jobs) changed it all. Social media arrived, the cloud became a go-to resource, we no longer stored our data on portable files that someone took home, and disaster recovery become a must-have business plan. Additionally, we have artificial intelligence, commercial drones, driverless vehicles, virtual reality, the Industrial Internet of Things, cloud and collaborative robots, and digital everything. We must never forget that cybercriminals evolve along with these changes.&lt;/p&gt;

&lt;p&gt;To quote Pink Floyd “It could be made into a monster if we all pull together as a team.”&lt;/p&gt;

&lt;p&gt;I mentioned I was part of a technology networking group, and this is how we work together, as a team.&amp;nbsp; Yes, we have a ton of overlap, and I don’t want to use the term “cooperative competition,” but in our group we each fill predetermined roles and truly help each other.&amp;nbsp; By doing this, we are collectively helping our clients and the Greater Dayton region with skilled resources in every aspect of technology.&lt;/p&gt;

&lt;p&gt;Here are our group’s categories:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;·&lt;font style="font-size: 9px;" face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; Data integration&lt;/li&gt;

  &lt;li&gt;·&lt;font style="font-size: 9px;" face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; Office hardware/software&lt;/li&gt;

  &lt;li&gt;·&lt;font style="font-size: 9px;" face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; Managed IT services (this is my spot)&lt;/li&gt;

  &lt;li&gt;·&lt;font style="font-size: 9px;" face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; IT coaching&lt;/li&gt;

  &lt;li&gt;·&lt;font style="font-size: 9px;" face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; IT staffing&lt;/li&gt;

  &lt;li&gt;·&lt;font style="font-size: 9px;" face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; IT promotional video&lt;/li&gt;

  &lt;li&gt;·&lt;font style="font-size: 9px;" face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; Structured cabling&lt;/li&gt;

  &lt;li&gt;·&lt;font style="font-size: 9px;" face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; Website and digital marketing&lt;/li&gt;

  &lt;li&gt;·&lt;font style="font-size: 9px;" face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; Fiber optics telecommunications&lt;/li&gt;

  &lt;li&gt;·&lt;font style="font-size: 9px;" face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; Copier and managed print services&lt;/li&gt;

  &lt;li&gt;·&lt;font style="font-size: 9px;" face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; Telecom/phone systems&lt;/li&gt;

  &lt;li&gt;·&lt;font style="font-size: 9px;" face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; Trade association education (this is Technology First’s spot)&lt;/li&gt;

  &lt;li&gt;·&lt;font style="font-size: 9px;" face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; Training and coding&lt;/li&gt;

  &lt;li&gt;·&lt;font style="font-size: 9px;" face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; Cybersecurity&lt;/li&gt;

  &lt;li&gt;·&lt;font style="font-size: 9px;" face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; Hardware OEM&lt;/li&gt;

  &lt;li&gt;·&lt;font style="font-size: 9px;" face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; Robotics&lt;/li&gt;

  &lt;li&gt;·&lt;font style="font-size: 9px;" face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; Software testing&lt;/li&gt;

  &lt;li&gt;·&lt;font style="font-size: 9px;" face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; Virtual reality&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;It’s an interesting mix and we have a ton of overlap with lots of gray areas to cover. But the plan with this thought process is that by working together we provide transparency and the right resources for our collective clients. &amp;nbsp;I took a quick look at “cybersecurity” and that one category all by itself has nearly as much gray area as the rest of technology.&amp;nbsp; It seems we live and work in the Gray Zone. &amp;nbsp;&lt;/p&gt;

&lt;p&gt;If you ask me what my company does, I will tell you “We’re a cybersecurity-focused managed IT services company.”&amp;nbsp; Sure, we do a lot of other things too, but I think this is a very black and white statement and hopefully easy to understand.&amp;nbsp; Technology First is the embodiment of this strategy with a mission to connect, strengthen and champion our IT community. Area businesses, and all their employees, will succeed and continue to grow if they are using the right technology resources for their needs. Let’s all be a part of that success as it ripples through our community.&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/12223192</link>
      <guid>https://www.technologyfirst.org/Tech-News/12223192</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Wed, 01 Dec 2021 15:47:36 GMT</pubDate>
      <title>A note from our Executive Director</title>
      <description>&lt;p&gt;&lt;font color="#DD4A3A"&gt;Melissa Cutcher, Executive Director, Technology First&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;As this year ends, I have been reflecting on our mission to connect, strengthen and be a champion for our IT community. So much has happened this year!&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;Technology First hosted almost fifty special interest group meetings to engage regional leadership, to learn and find inspiration in their field of interest. With over 1,000 IT professionals in attendance!&lt;/li&gt;

  &lt;li&gt;We hosted our first ever virtual digital mixer in partnership with Jobs Ohio and SOCHE. We had over twenty-five employers and over two hundred students and adults register for the event. It was a tremendous success, and we look forward to hosting the next Digital Mixer on Wednesday, February 16&lt;sup&gt;th,&lt;/sup&gt; at WSU Student Union.&lt;/li&gt;

  &lt;li&gt;In April we launched a new website! The new website is fantastic and allows for peer-to-peer communication through the forums. If you have not checked it out yet…&lt;a href="https://www.technologyfirst.org/Peer-Forum"&gt;https://www.technologyfirst.org/Peer-Forum&lt;/a&gt;&lt;/li&gt;

  &lt;li&gt;We hosted a Girl Scout Cyber Challenge in partnership with Girl Scouts of Western Ohio to explore the world of Cybersecurity for a day filled with activities. Activities were led by over twenty cyber security professionals/volunteers. Volunteers tasked just under fifty plus girl scouts with stopping a cybersecurity breach and went through various stations to break through technological based challenges.&lt;/li&gt;

  &lt;li&gt;Technology First awarded $5500 in Scholarships to IT students at University of Dayton, The Ohio State University, Wright State University, and Sinclair Community College. To date we have awarded over $95,000 to students across the region! And this year the golf outing raised over $3800 for the Technology First Scholarship Fund!&lt;/li&gt;

  &lt;li&gt;We participated in Career Adventure Camp in partnership with Dayton Metro Library and hosted four stations with almost 20 IT professionals who volunteered their time and talents towards to share IT career pathways with over 950 7&lt;sup&gt;th&lt;/sup&gt; &amp;amp; 8&lt;sup&gt;th&lt;/sup&gt; grade students. Our volunteers shared their professional journeys and experiences with the students and inspired them to consider careers in IT.&lt;/li&gt;

  &lt;li&gt;Taste of IT 2021 was in-person! Wow, what a momentous event and it was amazing to see everyone in 3-D. We had two keynotes, twenty-five breakout sessions, over thirty exhibitors and over 300 IT professionals in attendance. It was a major event full of learning, networking, and fun! We look forward to seeing you next year for the 16&lt;sup&gt;th&lt;/sup&gt; Annual Taste of IT on Wednesday, November 16, 2022!&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;AND, oh so much more! We would not be able to accomplish all these remarkable things, and more, if it were not for the amazing leadership and volunteers that make up Technology First. Thank you so much for your support. Volunteers change the world, and we are forever grateful! Thank you for joining us and we look forward to seeing you in 2022!&lt;/p&gt;

&lt;p&gt;Cheers!&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/12158156</link>
      <guid>https://www.technologyfirst.org/Tech-News/12158156</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Mon, 01 Nov 2021 19:30:00 GMT</pubDate>
      <title>Making Monitoring Pervasive</title>
      <description>&lt;p style="line-height: 37px;"&gt;&lt;font face="Verdana" color="#DD4A3A"&gt;&lt;span&gt;BY&amp;nbsp;&lt;/span&gt;&lt;a href="https://www.ahead.com/author/johnny-hatch/" title="Posts by Johnny Hatch" style="font-size: 18px; font-weight: normal;"&gt;JOHNNY HATCH&lt;/a&gt;, AHEAD&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 20px;"&gt;&lt;font face="Verdana"&gt;Historically, monitoring has been something that could be manually deployed to a set of physical or virtual infrastructures, and once in place, you were good to go. Alerts and events would occur if something went wrong, and the monitoring tool would simply notify you with details about the incident. IT operations teams would nurse their infrastructure back to health, and all was good and right in the world again.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 20px;"&gt;&lt;font face="Verdana"&gt;Fast-forward to today, however, and you’ll find a much different situation – one where enterprises are increasingly embracing a culture of DevOps and the world of monitoring is reckoning with the need to evolve and adapt. Production environments are no longer static or perpetual where monitoring is a one-and-done activity. Rather, concepts like observability—where teams are taking a holistic approach to measuring and understanding digital experiences—are being baked into the release management pipeline to ensure every application and every bit of infrastructure being deployed has monitoring attached to it. But how do you get there? What tools and technologies are ushering in this new age of monitoring and observability? The not-so-surprising answer: An intelligent combination of&amp;nbsp;automation&amp;nbsp;and&amp;nbsp;data.&lt;/font&gt;&lt;/p&gt;

&lt;h2 style="line-height: 28px;"&gt;&lt;font face="Verdana"&gt;A Call to Automation&lt;/font&gt;&lt;/h2&gt;

&lt;p style="line-height: 20px;"&gt;&lt;font face="Verdana"&gt;As the velocity of software release cycles increases, the manual approach to deploying monitoring agents or instrumenting everything in the release for proper observability becomes impractical and counterproductive. Can you imagine a developer checking in code to a source code management repository, creating a ticket in an ITSM system, and requiring someone within IT operations to manually deploy monitoring to that release? That flies in the face of speed, agility, and what a culture of DevOps is trying to accomplish (releasing better software, faster).&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 20px;"&gt;&lt;font face="Verdana"&gt;Leveraging automation tools, such as Ansible, Puppet, or Chef, is a great first step toward making monitoring pervasive with every release. This may involve the automated deployment and installation of a monitoring agent, the customization of a configuration file to define what gets monitored, or API calls to the control plane of a monitoring system to register new systems for observation. Fortunately, many continuous integration (CI) tools either have these automation capabilities out-of-the-box or stitch well with third-party automation tools.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 20px;"&gt;&lt;font face="Verdana"&gt;Another growing trend we’re seeing in the quest toward making monitoring pervasive is ‘observability as code.’ In the same way that&amp;nbsp;&lt;a href="https://www.ahead.com/resources/infrastructure-as-code-the-gateway-to-modern-platforms/"&gt;infrastructure as code&lt;/a&gt;&amp;nbsp;seeks to codify infrastructure components as configuration files using JSON or YAML for consistent and repeatable use, we can leverage a similar capability with monitoring and observability. Increasingly, we’re seeing observability vendors develop terraform providers to do just that.&amp;nbsp; Head over to the&amp;nbsp;&lt;a href="https://registry.terraform.io/"&gt;Terraform Registry&lt;/a&gt;&amp;nbsp;and search for your favorite observability vendor to see if they have something listed.&lt;/font&gt;&lt;/p&gt;

&lt;h2 style="line-height: 28px;"&gt;&lt;font face="Verdana"&gt;A Data-Driven Approach&lt;/font&gt;&lt;/h2&gt;

&lt;p style="line-height: 20px;"&gt;&lt;font face="Verdana"&gt;Once a repeatable structure has been established to deploy observability in an automated fashion, we can take things a step further in the use and maturity of observability data. If the goal of DevOps is to release better software more quickly, the question of&amp;nbsp;&lt;em&gt;how&lt;/em&gt;&amp;nbsp;&lt;em&gt;we do that&lt;/em&gt;&amp;nbsp;begs to be asked. Observability provides one answer: by leveraging data about the health, performance, and availability of the application while running in a pre-production, lower-tier environment. You might be asking yourself, “does that mean monitoring and observability should be deployed outside of just production?” The short answer is&amp;nbsp;yes. There are a host of benefits to having the telemetry data to make better-informed decisions about whether or not to promote code from a pre-production environment to a production environment. Many in the marketplace have begun to call this process ‘release verification.’&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 20px;"&gt;&lt;font face="Verdana"&gt;Among the largest data sources to drive this automated decision-making process are the metrics, logs, and traces from our observability stack. If there is too much latency being identified by our APM tool, too many errors in the logs, or anomalous metrics coming from our applications or infrastructure, then our tooling should be integrated or stitched into our delivery pipelines to throw up a red flag and say, “Stop! Don’t release or promote this code.” In addition to taking automated action, it would also facilitate a quick feedback loop to the development team, providing insight into why it failed so developers can spend more time on value-add activities and less time troubleshooting.&lt;/font&gt;&lt;/p&gt;

&lt;h2 style="line-height: 28px;"&gt;&lt;font face="Verdana"&gt;Conclusion&lt;/font&gt;&lt;/h2&gt;

&lt;p style="line-height: 20px;"&gt;&lt;font face="Verdana"&gt;Monitoring maturity has come a long way in a short period of time – especially as the ways infrastructure and applications are architected and released to market have evolved. Learning to become proactive in the use of monitoring and observability data as part of a CI/CD pipeline can be new to a lot of traditional operations teams (particularly for those who have historically focused on incident response activities). However, employing an automated and data-driven approach to the use of observability will result in better software, differentiated products and services, happier customers, and outpaced competition.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/12092676</link>
      <guid>https://www.technologyfirst.org/Tech-News/12092676</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Fri, 08 Oct 2021 18:19:58 GMT</pubDate>
      <title>Magnetic Mobile doubles in size, names Brian Sichi as CEO</title>
      <description>&lt;a href="https://www.magneticmobile.com/blog/magnetic-blogs-brian-sichi-press-release" target="_blank"&gt;&lt;em&gt;Magnetic Mobile is pleased to welcome Brian Sichi as its new Chief Executive Officer as the company continues to expand its capabilities and workforce.&lt;/em&gt;&lt;/a&gt;

&lt;p&gt;Sichi brings more than 20 years of experience growing innovative teams at international technology consultancies. Magnetic co-founders Beck and Barry Besecker will remain active board members.&lt;/p&gt;

&lt;p&gt;&lt;img src="https://www.magneticmobile.com/Content/images/brian-sichi-headshot-press-release.jpg" alt="Headshot of Brian Sichi" width="212" height="319"&gt;&lt;/p&gt;

&lt;p&gt;The pandemic has driven more retail activity to the digital space. This increased demand for standout online and in-app experiences has helped Magnetic Mobile grow new and existing client partnerships. Having recently increased revenue by 85% and nearly doubled its workforce, the company looks to continue that expansion into 2022 and beyond.&lt;/p&gt;

&lt;p&gt;“Magnetic has a proven track record of delivering superior customer engagement for our partners and that reputation allows us to take advantage of new opportunities in the current landscape,” said Beck Besecker. “Brian’s vast experience leading collaborative teams at some of the world’s best enterprise-level tech firms will help us capitalize on that momentum, building on our strengths and growing Magnetic’s portfolio.”&lt;/p&gt;

&lt;p&gt;Previously the Retail Loyalty Division of sister company Marxent before spinning out in 2016, Magnetic Mobile has partnered with Speedway (now part of the 7-Eleven family) for nearly a decade to support the digital components of its industry-leading Speedy Rewards program.&lt;/p&gt;

&lt;p&gt;Magnetic Mobile combines data-driven design strategy with the latest technology to create digital experiences that keep customers coming back for more. With expertise in UX design, content strategy, front-end and back-end web development, mobile applications, and digital promotions management, Magnetic supports every step of the customer journey.&lt;/p&gt;

&lt;p&gt;With headquarters in the heart of the Cincinnati-Dayton technology corridor, Magnetic is proud to be rooted in the Midwest. Rapid growth during the pandemic has enabled expansion of its remote workforce, adding top talent from across the country.&lt;/p&gt;

&lt;p&gt;Magnetic has developed mobile applications and responsive websites for many of the nation’s top manufacturing and retail brands including Champion Windows &amp;amp; Home Exteriors, La-Z-Boy, and Bob’s Discount Furniture.&lt;/p&gt;

&lt;p&gt;“Having been a client of Magnetic’s sister company, Marxent, I experienced first hand the customer focus and innovation that Beck and Barry bring to organizations. I look forward to working with them in their continued roles on the Magnetic board,” said Brian Sichi. “I couldn’t be more excited to join the leadership team at Magnetic and to expand on that legacy as we bring Magnetic’s capabilities to a broader client base while continuing to innovate.”&lt;/p&gt;

&lt;p&gt;Sichi brings to Magnetic more than two decades of experience driving innovation at some of the largest technology consultancies in the world. Most recently, he worked as Director of U-Collaborate Innovation &amp;amp; Digital solutions for KPMG Australia.&lt;/p&gt;

&lt;p&gt;His previous roles include Exponentials &amp;amp; Analytics Lead for Deloitte’s Leadership Center for Clients and Strategy, Innovation, &amp;amp; Transformation Practice Lead for Capgemini Government Solutions. Sichi is also a Marine Corps veteran, having served in the United States, Somalia, and Korea.&lt;/p&gt;

&lt;p&gt;“Magnetic is a high-performing organization positioned to take our success even higher,” said Sichi. “We are a company built for a tech-savvy world and have a great opportunity to help existing and new clients improve their digital brand.”&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/11203350</link>
      <guid>https://www.technologyfirst.org/Tech-News/11203350</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Tue, 28 Sep 2021 21:40:28 GMT</pubDate>
      <title>Your Greatest Cybersecurity Asset</title>
      <description>&lt;p&gt;&lt;font style="font-size: 18px;" color="#DD4A3A"&gt;Chris Kuhl, CISO/CTO, Dayton Children's Hospital&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;Is your greatest cybersecurity asset that shiny new tool your organization just purchased?&amp;nbsp; What about the integration between tool A &amp;amp; tool B into a unified dashboard? This is the great conundrum for cybersecurity teams, and I would like to convince you, that your greatest cybersecurity asset is your users.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;According to Gartner, an IT research and advisory company, the worldwide cybersecurity market spending is forecasted to reach $170.4 billion in by 2022.&amp;nbsp; Yet, in 2020, organizations still suffered from a global loss of $945 billion.&amp;nbsp; I believe it is safe to say that we need a more comprehensive cyber strategy, that includes addressing the human risk along with the technology risk.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;According to the 2021 Verizon Data Breach Investigations Report (DBIR), over 85% of all breaches involved human interaction.&amp;nbsp; Human interaction includes phishing attacks, human error, misuse of privileges or having easily guessed passwords.&amp;nbsp; To focus in even more, phishing and passwords are the top two risks to any organization for a third year in a row.&amp;nbsp; Luckily, you can address all these topics with a security awareness program.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;Creating a comprehensive security awareness program isn’t difficult.&amp;nbsp; It takes the three most challenging resources to acquire: time, leadership support, and an understanding of your organization’s culture.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;The first thing we need to do is replace the old mantra &lt;em&gt;“users are the weakest link in your cyber defense”&lt;/em&gt; with &lt;em&gt;“people are the primary attack vector.”&lt;/em&gt;&amp;nbsp; In healthcare, we are talking about people with advanced degrees, years of experience in their respective fields and valuable insight.&amp;nbsp; None of which is geared towards cybersecurity.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;Secondly, we need to survey our users to gain a better understanding of the cybersecurity culture in our organizations.&amp;nbsp; Once you understand the current culture around cybersecurity, you can begin to develop the four focus areas for your awareness program.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;Two important categories were mentioned above, phishing and passwords.&amp;nbsp; Easy ways to identify/report a phishing email and the use of passphrases instead of passwords should be included in your security training.&amp;nbsp; That just leaves two additional categories unique to your organization.&amp;nbsp; If you have a lot of remote workers, you might want to cover how to work remote safely and securely.&amp;nbsp; If you are doing manufacturing, you may want to cover what to look for with physical security and tailgating into the controlled rooms.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;The importance of cybersecurity awareness training has become more front and center in the last 20 months.&amp;nbsp; Traditional network perimeters are dissolving from a combination of cloud platforms, smart devices and employees working from home more.&amp;nbsp; Protecting the user’s identity and PC become that much more important.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;Our main goal, as cybersecurity professionals, is to secure our organization.&amp;nbsp; To quote Gabe Bassett, one of the authors of the DBIR, &lt;em&gt;“Your job is not to secure your computers but your organization. And if you’re not securing your people, you’re not securing your organization.”&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/11127394</link>
      <guid>https://www.technologyfirst.org/Tech-News/11127394</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Tue, 28 Sep 2021 21:36:00 GMT</pubDate>
      <title>10 Cybersecurity Best Practices for Mid-Size Organizations</title>
      <description>&lt;p&gt;&lt;font face="Verdana" color="#DD4A3A"&gt;Cadre Information Security&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 20px;"&gt;&lt;font face="Verdana"&gt;Alleviating cybersecurity risks comes in many shapes and sizes—and so do organizations. Large enterprises with deep pockets and full-fledged SOC teams adopt the latest technologies and processes to fight back against adversaries. But for mid-size organizations, reducing risk is often constrained to a pick-and-choose approach. With limited funds, headcount, and internal knowledge, those responsible for keeping data secure are left wrangling the tough decisions of what matters most.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 20px;"&gt;&lt;font face="Verdana"&gt;Here at Cadre, we firmly believe that there is no “one size fits all” approach. We’ve had decades of experience with a variety of companies—some probably resembling yours. But even still, there isn’t a carbon copy of a security prescription to dole out. However, that doesn’t mean there aren’t best practices that everyone can follow to avoid common mistakes. And that’s the guidance you’re here for after all, so let’s jump in:&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;strong&gt;&lt;font&gt;1. Don’t discount your value.&lt;/font&gt;&lt;/strong&gt;&lt;font&gt;&amp;nbsp;Many mid-size organizations think that just because they are smaller, they aren’t a target. On the contrary, adversaries often perceive smaller companies as easy targets—and without the proper protections, they can linger undetected for lengthy periods of time.&lt;/font&gt;&lt;br&gt;
&lt;strong&gt;&lt;font&gt;2. Know where your security gaps are.&lt;/font&gt;&lt;/strong&gt;&lt;font&gt;&amp;nbsp;We all get caught up in the day-to-day work. Especially when there’s new malware at every turn. But it’s critical to carve out time to analyze security risks as the business and world changes.&lt;/font&gt;&lt;br&gt;
&lt;strong&gt;&lt;font&gt;3. Establish a baseline.&lt;/font&gt;&lt;/strong&gt;&lt;font&gt;&amp;nbsp;If you don’t know what is “normal,” how will you know what activity is “abnormal” on your network and devices? Businesses should have some form of monitoring and logging in place to flag any activity or incident that should be investigated.&lt;/font&gt;&lt;br&gt;
&lt;strong&gt;&lt;font&gt;4. Inventory your assets, and do it regularly.&lt;/font&gt;&lt;/strong&gt;&lt;font&gt;&amp;nbsp;People and devices come and go. Be sure to complete quarterly asset inventory assessments so you know who and what is connected to your network.&lt;/font&gt;&lt;br&gt;
&lt;strong&gt;&lt;font&gt;5. Train users on security more often.&lt;/font&gt;&lt;/strong&gt;&lt;font&gt;&amp;nbsp;There is never enough security training. Even the most vigilant users fall for phishing attempts. By creating more training opportunities, companies can move towards a culture of security where users understand strong cybersecurity isn’t only important for the company, but for them personally, too.&lt;/font&gt;&lt;br&gt;
&lt;strong&gt;&lt;font&gt;6. Evaluate supply chain threats.&lt;/font&gt;&lt;/strong&gt;&lt;font&gt;&amp;nbsp;If recent high-profile breaches have taught us anything, it’s that the supply chain is more vulnerable than ever. We will begin to see it being regulated more, which can impact business function and revenue.&lt;/font&gt;&lt;br&gt;
&lt;strong&gt;&lt;font&gt;7. Put a business continuity plan into place.&lt;/font&gt;&lt;/strong&gt;&lt;font&gt;&amp;nbsp;The old saying goes, “it’s not a matter of if you will be breached, but when.” Be sure your organization has continuity plans in place covering impacts from basic cybersecurity to core business functions for everything from targeted disruptions to a worst-case scenario.&lt;/font&gt;&lt;br&gt;
&lt;strong&gt;&lt;font&gt;8. Segment your network.&lt;/font&gt;&lt;/strong&gt;&lt;font&gt;&amp;nbsp;What’s worse than a malicious actor that gets into your network? One that can move freely within it. To prevent this, be sure to segment your network.&lt;/font&gt;&lt;br&gt;
&lt;strong&gt;&lt;font&gt;9. Patch.&lt;/font&gt;&lt;/strong&gt;&lt;font&gt;&amp;nbsp;Need we say more? Okay yes, patch in a timely manner and in a deliberate fashion. Audit your patching.&lt;/font&gt;&lt;br&gt;
&lt;strong&gt;&lt;font&gt;10. Accept help.&lt;/font&gt;&lt;/strong&gt;&lt;font&gt;&amp;nbsp;Cybersecurity changes every day. Keeping up with vendors and their technologies, sifting through acronyms, and steadying a finger on the pulse of your company’s security is often an impossible task. Be sure you have a lifeline when something goes wrong or you need an outside perspective from a trusted source.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;font&gt;Of course, this list isn’t comprehensive, but it’s a good place to start. Even if you’re heard many of these best practices before, it can be a gentle reminder that some need renewed attention.&lt;/font&gt;&lt;br&gt;
&lt;br&gt;
&lt;font&gt;Still struggling with these 10? Need more help getting your cybersecurity in order? Read our blog,&amp;nbsp;&lt;/font&gt;&lt;a href="https://blog.cadre.net/10-reasons-a-vciso-may-be-a-good-choice-for-your-company"&gt;&lt;font&gt;10 Reasons a vCISO May be a Good Choice for Your Company.&lt;/font&gt;&lt;/a&gt;&lt;/font&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/11127571</link>
      <guid>https://www.technologyfirst.org/Tech-News/11127571</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Tue, 28 Sep 2021 21:17:08 GMT</pubDate>
      <title>Speakers Needed! Share about your career with future IT students!</title>
      <description>&lt;p&gt;&lt;font face="Verdana" color="#099AC6"&gt;&lt;strong&gt;&lt;span&gt;SOCHE Announces Virtual Sessions with Employers on Careers in Information Technology&lt;/span&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;strong&gt;&lt;font&gt;Purpose:&lt;/font&gt;&lt;/strong&gt; &lt;font&gt;To expose High School teachers and Career Guidance Champions to the different career opportunities in Information Technology to better direct students in career paths&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;strong&gt;&lt;font&gt;When:&lt;/font&gt;&lt;/strong&gt; &lt;font&gt;Tuesdays from 3 PM - 4 PM (19 Oct - 7 Dec 2021)&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;strong&gt;&lt;font&gt;How:&lt;/font&gt;&lt;/strong&gt; &lt;font&gt;Live&lt;/font&gt; &lt;font&gt;1-hour virtual sessions that will be recorded to share across all schools in Ohio for greater impact&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;strong&gt;&lt;font&gt;Audience:&amp;nbsp;&lt;/font&gt;&lt;/strong&gt; &lt;font&gt;High school teachers, career champions,&amp;nbsp; guidance counselors&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;strong&gt;&lt;font&gt;Presenter:&lt;/font&gt;&lt;/strong&gt; &lt;font&gt;Employers who have experts in the listed topics &lt;strong&gt;&lt;font color="#DD4A3A"&gt;&amp;gt;&amp;gt; This could be you!!&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;strong&gt;&lt;font&gt;Format:&lt;/font&gt;&lt;/strong&gt; &lt;font&gt;25-minute information session on each topic below (e.g. Computer Programmer) given by Presenter with 5-minute Q&amp;amp;A. Suggested talking points for the presenter are offered below. The presenter can create a PowerPoint presentation or a demo that explains their job.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;table cellpadding="0" cellspacing="0" width="823"&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td height="20" width="64"&gt;Date&lt;/td&gt;

      &lt;td width="425"&gt;Topic 1: 3 -3:30 PM&lt;/td&gt;

      &lt;td width="334"&gt;Topic 2: 3:30 - 4 PM&lt;/td&gt;
    &lt;/tr&gt;

    &lt;tr&gt;
      &lt;td height="60" align="right"&gt;19-Oct&lt;/td&gt;

      &lt;td width="425"&gt;&amp;nbsp;IT technician/End-user support - collaborates with support specialists to analyze and diagnose computer issues&lt;/td&gt;

      &lt;td width="334"&gt;Support specialists - responsible for reviewing and solving computer network and hardware problems for a business&amp;nbsp;&lt;/td&gt;
    &lt;/tr&gt;

    &lt;tr&gt;
      &lt;td height="60" align="right"&gt;26-Oct&lt;/td&gt;

      &lt;td width="425"&gt;Computer programmer - writes new computer software using coding languages (provide example of different languages and when to use them)&lt;/td&gt;

      &lt;td width="334"&gt;Release Management – delivering new software and hardware to users&lt;/td&gt;
    &lt;/tr&gt;

    &lt;tr&gt;
      &lt;td height="60" align="right"&gt;2-Nov&lt;/td&gt;

      &lt;td width="425"&gt;&amp;nbsp;Quality assurance - testers who check software products to see if they're up to industry standards and free of any issues&amp;nbsp;&lt;/td&gt;

      &lt;td width="334"&gt;User experience (UX) - designer is involved with all facets of product development regarding its purchasing, branding, usability and functionality.&amp;nbsp;&lt;/td&gt;
    &lt;/tr&gt;

    &lt;tr&gt;
      &lt;td height="60" align="right"&gt;9-Nov&lt;/td&gt;

      &lt;td width="425"&gt;Web development - design the appearance, navigation and content organization of a website&amp;nbsp;&lt;/td&gt;

      &lt;td width="334"&gt;Data scientist - analyzes and organizes data to determine trends that can influence business decisions.&lt;/td&gt;
    &lt;/tr&gt;

    &lt;tr&gt;
      &lt;td height="100" align="right"&gt;16-Nov&lt;/td&gt;

      &lt;td width="425"&gt;Database administrator - employs specialized software to organize and keep track of data. The software can be associated with software configuration, security and performance when applicable.&amp;nbsp;&lt;/td&gt;

      &lt;td width="334"&gt;Network engineers - work on the day-to-day maintenance and development of a company's computer network, utilizing their skills to make the network available and efficient for all employees within an organization.&lt;/td&gt;
    &lt;/tr&gt;

    &lt;tr&gt;
      &lt;td height="60" align="right"&gt;23-Nov&lt;/td&gt;

      &lt;td width="425"&gt;Systems analyst - reviews design components and uses their knowledge of information technology to solve business problems&amp;nbsp;&lt;/td&gt;

      &lt;td width="334"&gt;Software engineers - applies their knowledge of mathematics and computer science to create and improve new software.&amp;nbsp;&lt;/td&gt;
    &lt;/tr&gt;

    &lt;tr&gt;
      &lt;td height="40" align="right"&gt;30-Nov&lt;/td&gt;

      &lt;td width="425"&gt;IT security - builds and maintains digital protective measures on intellectual property and data that belong to an organization.&amp;nbsp;&amp;nbsp;&lt;/td&gt;

      &lt;td width="334"&gt;IT Director oversees the strategy and execution of IT operations for an organization.&lt;/td&gt;
    &lt;/tr&gt;

    &lt;tr&gt;
      &lt;td height="40" align="right"&gt;7-Dec&lt;/td&gt;

      &lt;td width="425"&gt;Computer scientist &amp;nbsp;- applies their technological skills and resources to solve IT problems for businesses.&amp;nbsp;&lt;/td&gt;

      &lt;td width="334"&gt;IT Project Manager – Oversees the hardware and software projects&lt;/td&gt;
    &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;

&lt;p&gt;&lt;strong&gt;Presenter Talking Points:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;What is your job and how does it relate to your company’s success?&lt;/li&gt;

  &lt;li&gt;What is a typical day like for you?&lt;/li&gt;

  &lt;li&gt;How many hours a day do you spend in meetings or working in groups?&lt;/li&gt;

  &lt;li&gt;Do you mainly sit at a desk doing work individually or do you have an opportunity to work in different environments?&lt;/li&gt;

  &lt;li&gt;Are you expected to be oncall? If yes, how often?&lt;/li&gt;

  &lt;li&gt;What education or other experience helped you to get your current job?&lt;/li&gt;

  &lt;li&gt;When hiring a new employee in your department, what education does a candidate need?&lt;/li&gt;

  &lt;li&gt;What skill do you most value in hiring a new employee?&lt;/li&gt;

  &lt;li&gt;What advice w&lt;span&gt;ould you give a student considering a career in your field?&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#099AC6"&gt;Contact Information: Please email your timeslot preferences &amp;gt;&amp;gt;&amp;nbsp;Patty Buddelmeyer (patty.buddelmeyer@soche.org)&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/11127511</link>
      <guid>https://www.technologyfirst.org/Tech-News/11127511</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Tue, 28 Sep 2021 21:07:46 GMT</pubDate>
      <title>Bringing Risk Into View: A Guide to More Effective Vendor Risk Management</title>
      <description>&lt;p&gt;&lt;font face="Verdana" color="#DD4A3A"&gt;Nina Wyatt, Senior Technical Consultant, AHEAD&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 20px;"&gt;&lt;font face="Verdana"&gt;Managing&amp;nbsp;vendor&amp;nbsp;risk has become&amp;nbsp;a&amp;nbsp;challenging&amp;nbsp;standard practice&amp;nbsp;for most organizations today.&amp;nbsp;With the adoption of cloud technologies and globalization of technology service providers,&amp;nbsp;more companies are working to evaluate the security programs of vendors and service providers&amp;nbsp;as well as gain visibility of vendor risk overall. Whether you are&amp;nbsp;tasked with&amp;nbsp;evaluating&amp;nbsp;a vendor’s security program or&amp;nbsp;responsible for maintaining visibility of enterprise vendor risk, both functions&amp;nbsp;present&amp;nbsp;challenges and barriers.&amp;nbsp;Among these&amp;nbsp;challenges, one of the most difficult&amp;nbsp;for organizations&amp;nbsp;to&amp;nbsp;navigate&amp;nbsp;is completing&amp;nbsp;security&amp;nbsp;questionnaires&amp;nbsp;for partners or clients dependent upon their services,&amp;nbsp;as no single industry or company has adopted a&amp;nbsp;widely&amp;nbsp;used&amp;nbsp;standard for the process.&amp;nbsp;This results in teams receiving lengthy questionnaires that all differ in volume and complexity.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 20px;"&gt;&lt;font face="Verdana"&gt;Another key challenge arrives for companies&amp;nbsp;needing to&amp;nbsp;establish a process for&amp;nbsp;maintaining&amp;nbsp;holistic, enterprise-level&amp;nbsp;visibility of&amp;nbsp;vendor&amp;nbsp;risk.&amp;nbsp;The present reality is that&amp;nbsp;most companies find themselves burdened by both&amp;nbsp;of these processes.&amp;nbsp;Below, we’ll explore actionable steps to reduce the difficulty of managing&amp;nbsp;vendor&amp;nbsp;security and&amp;nbsp;risk&amp;nbsp;questionnaires,&amp;nbsp;and&amp;nbsp;steps to&amp;nbsp;enhance the security of your organization&amp;nbsp;through establishing a vendor due diligence review process.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 24px;"&gt;&lt;strong&gt;Simplifying Security Questionnaire Response&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 20px;"&gt;&lt;font face="Verdana"&gt;Multiple solutions exist to&amp;nbsp;mitigate the challenge&amp;nbsp;of performing&amp;nbsp;vendor&amp;nbsp;security assessments, but&amp;nbsp;very&amp;nbsp;few&amp;nbsp;address&amp;nbsp;the burden of completing security questionnaires.&amp;nbsp;However, you can&amp;nbsp;greatly&amp;nbsp;reduce this burden by doing the following:&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;strong&gt;Create a Repeatable Process&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li style="line-height: 20px;"&gt;&lt;font face="Verdana"&gt;Gather all information about the controls in your environment and provide the same questionnaire to all requestors&amp;nbsp;&lt;/font&gt;&lt;/li&gt;

  &lt;li style="line-height: 20px;"&gt;&lt;font face="Verdana"&gt;Eliminate questions not applicable to your business, operations, and environment&amp;nbsp;&lt;/font&gt;&lt;/li&gt;

  &lt;li style="line-height: 20px;"&gt;&lt;font face="Verdana"&gt;Keep answers short and simple&amp;nbsp;&lt;/font&gt;&lt;/li&gt;

  &lt;li style="line-height: 20px;"&gt;&lt;font face="Verdana"&gt;Create an encrypted, password protected, and&amp;nbsp;centralized repository&amp;nbsp;that includes&amp;nbsp;public-facing/redacted policy/program documents, attestations, security compliance overview presentations, and a single version of your questionnaire&amp;nbsp;&lt;/font&gt;&lt;/li&gt;

  &lt;li style="line-height: 20px;"&gt;&lt;font face="Verdana"&gt;Recognize that offering too much information, screen shots, or tool-specific responses can exacerbate the problem&amp;nbsp;&lt;/font&gt;&lt;/li&gt;

  &lt;li style="line-height: 20px;"&gt;&lt;font face="Verdana"&gt;Ensure&amp;nbsp;that&amp;nbsp;all questions offer consistent responses&amp;nbsp;whenever possible&amp;nbsp;&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;strong&gt;Recognize&amp;nbsp;That&amp;nbsp;Certification&amp;nbsp;Attestation&amp;nbsp;Can&amp;nbsp;Validate&amp;nbsp;Strength of&amp;nbsp;Control&amp;nbsp;Environment&lt;/strong&gt;&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li style="line-height: 20px;"&gt;&lt;font face="Verdana"&gt;Understand how certification&amp;nbsp;(SOC2, ISO, NIST)&amp;nbsp;can help&amp;nbsp;–&amp;nbsp;many topics covered in questionnaires are&amp;nbsp;also&amp;nbsp;covered in&amp;nbsp;the control&amp;nbsp;attestation process&amp;nbsp;&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;strong&gt;Recognize&amp;nbsp;Liability&amp;nbsp;Associated with&amp;nbsp;Security&amp;nbsp;Questionnaires&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li style="line-height: 20px;"&gt;
    &lt;font face="Verdana"&gt;Acknowledge that security questionnaires can be traced to liability risk, which&amp;nbsp;may be inevitable&amp;nbsp;for&amp;nbsp;some&amp;nbsp;organizations&amp;nbsp;&lt;/font&gt;

    &lt;div style="margin-left: 2em"&gt;
      &lt;ul&gt;
        &lt;li style="line-height: 20px;"&gt;&lt;font face="Verdana"&gt;Upon completing the questionnaire,&amp;nbsp;any future incident may prove a question was answered&amp;nbsp;incorrectly, and&amp;nbsp;organizations&amp;nbsp;can be&amp;nbsp;held liable for negligence or misrepresentation of the “secure” environment&amp;nbsp;&lt;/font&gt;&lt;/li&gt;

        &lt;li style="line-height: 20px;"&gt;&lt;font face="Verdana"&gt;When evaluating the security of another organization,&amp;nbsp;any future incident may prove&amp;nbsp;a&amp;nbsp;questionnaire and risk assessment process&amp;nbsp;to be&amp;nbsp;inadequate, and&amp;nbsp;companies&amp;nbsp;can be&amp;nbsp;held liable for failing to perform an appropriate level of due diligence in vendor selection or monitoring&amp;nbsp;&lt;/font&gt;&lt;/li&gt;
      &lt;/ul&gt;
    &lt;/div&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;p style="line-height: 20px;"&gt;&lt;font face="Verdana"&gt;This process&amp;nbsp;requires both&amp;nbsp;time and resources, which also introduces liability. If&amp;nbsp;it becomes&amp;nbsp;merely&amp;nbsp;another&amp;nbsp;‘box’&amp;nbsp;to&amp;nbsp;‘check,’&amp;nbsp;consider revising the process to produce actionable and desired outcomes&amp;nbsp;that&amp;nbsp;enhance the&amp;nbsp;visibility of&amp;nbsp;vendor&amp;nbsp;risk.&amp;nbsp;For example, instead of asking for a policy about vulnerability management, ask for validation that no critical vulnerabilities exist in the environment. Not all&amp;nbsp;vendors will be willing to share this information;&amp;nbsp;however, a documented policy is not equal to control validation – and control validation is the only reliable source of&amp;nbsp;security&amp;nbsp;control&amp;nbsp;assurance.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;strong&gt;Proactively&amp;nbsp;Avoid&amp;nbsp;Missed&amp;nbsp;Business&amp;nbsp;Opportunities&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li style="line-height: 20px;"&gt;&lt;font face="Verdana"&gt;If gaps are identified in your responses,&amp;nbsp;include&amp;nbsp;a&amp;nbsp;remediation plan&amp;nbsp;with a target date for completion&amp;nbsp;(to&amp;nbsp;prevent&amp;nbsp;voiding&amp;nbsp;potential business opportunities)&amp;nbsp;&lt;/font&gt;&lt;/li&gt;

  &lt;li style="line-height: 20px;"&gt;&lt;font face="Verdana"&gt;At minimum, this will show that your assessment processes are functioning and that there is already a plan in place to address self-identified control gaps&amp;nbsp;&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 24px;"&gt;&lt;strong&gt;Achieving Holistic&amp;nbsp;Vendor&amp;nbsp;Risk Visibility&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 20px;"&gt;&lt;font face="Verdana"&gt;If you are struggling to understand your organization’s&amp;nbsp;vendor&amp;nbsp;risk holistically, there are many solutions that can help.&amp;nbsp;As with any great automation capability, process is paramount.&amp;nbsp;Consider the following recommendations to raise your organization’s awareness of&amp;nbsp;vendor&amp;nbsp;risk:&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;strong&gt;Establish a Policy or Standard&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 20px;"&gt;&lt;font face="Verdana"&gt;Begin with a policy&amp;nbsp;or&amp;nbsp;standard for evaluating vendors based upon your organization’s expectations (or regulatory requirements).&amp;nbsp;The&amp;nbsp;policy or&amp;nbsp;standard&amp;nbsp;should be framed by risk exposure&amp;nbsp;and include:&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li style="line-height: 20px;"&gt;&lt;font face="Verdana"&gt;What conditions or criteria determine the level of risk associated with a service provider&amp;nbsp;&lt;/font&gt;&lt;/li&gt;

  &lt;li style="line-height: 20px;"&gt;&lt;font face="Verdana"&gt;Which reviews are performed&amp;nbsp;relative&amp;nbsp;to the level of risk associated with each service&amp;nbsp;provider&amp;nbsp;&lt;/font&gt;&lt;/li&gt;

  &lt;li style="line-height: 20px;"&gt;&lt;font face="Verdana"&gt;How frequently risk will be assessed&amp;nbsp;(e.g., if a vendor is high-risk, consider performing annual reviews;&amp;nbsp;if a vendor is low-risk, consider performing bi-annual reviews)&amp;nbsp;&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style="line-height: 20px;"&gt;&lt;font face="Verdana"&gt;It is&amp;nbsp;vital&amp;nbsp;to ensure that you&amp;nbsp;can&amp;nbsp;identify&amp;nbsp;when conditions or characteristics of a service engagement change, as this may&amp;nbsp;translate to a change in risk&amp;nbsp;and require a change in policy&amp;nbsp;(type of review, frequency of review, etc.). Without a mechanism to&amp;nbsp;determine when and how&amp;nbsp;the scope of an engagement has changed,&amp;nbsp;the&amp;nbsp;risk&amp;nbsp;of&amp;nbsp;falling&amp;nbsp;out of compliance with the&amp;nbsp;established&amp;nbsp;policy or standard&amp;nbsp;is heightened.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;strong&gt;Categorize Vendors by Risk&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 20px;"&gt;&lt;font face="Verdana"&gt;What conditions or characteristics need to be understood to categorize vendors by level of risk?&amp;nbsp;As usual,&amp;nbsp;it depends!&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 20px;"&gt;&lt;font face="Verdana"&gt;If your organization has an&amp;nbsp;appropriately structured&amp;nbsp;Enterprise Risk Program,&amp;nbsp;it is likely that&amp;nbsp;these conditions and characteristics are already&amp;nbsp;outlined&amp;nbsp;in what is typically referred to as&amp;nbsp;a&amp;nbsp;&lt;em&gt;risk tolerance&lt;/em&gt;&amp;nbsp;or&amp;nbsp;&lt;em&gt;risk threshold&lt;/em&gt;&amp;nbsp;statement&amp;nbsp;within&amp;nbsp;your&amp;nbsp;risk management framework or risk&amp;nbsp;assessment methodology.&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 20px;"&gt;&lt;font face="Verdana"&gt;On the other hand, if&amp;nbsp;your&amp;nbsp;organization does not have a well-defined Enterprise Risk Program, you&amp;nbsp;may&amp;nbsp;not&amp;nbsp;have&amp;nbsp;achieved&amp;nbsp;a level of growth that warrants one&amp;nbsp;(yet). The good news is that you can inspire risk reduction specific to IT security by establishing a risk assessment methodology&amp;nbsp;that centers around&amp;nbsp;information&amp;nbsp;security&amp;nbsp;risk (availability,&amp;nbsp;confidentiality, integrity).&amp;nbsp;For an information security-centric approach, consider the following:&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;blockquote&gt;
  &lt;h4 style="line-height: 18px;"&gt;&lt;font face="Verdana"&gt;AVAILABILITY RISK&lt;/font&gt;&lt;/h4&gt;
&lt;/blockquote&gt;

&lt;div style="margin-left: 4em"&gt;
  &lt;ul&gt;
    &lt;li style="line-height: 20px;"&gt;
      &lt;font face="Verdana"&gt;Is the service provider providing something that is critical to the operation of my business?&amp;nbsp;&lt;/font&gt;

      &lt;ul&gt;
        &lt;li style="line-height: 20px;"&gt;&lt;font face="Verdana"&gt;If this service is interrupted, would the impact to my operations be extensive or minimal?&lt;/font&gt;&lt;/li&gt;
      &lt;/ul&gt;
    &lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;blockquote&gt;
  &lt;h4 style="line-height: 18px;"&gt;&lt;font face="Verdana"&gt;CONFIDENTIALITY/INTEGRITY RISK&lt;/font&gt;&lt;/h4&gt;
&lt;/blockquote&gt;

&lt;div style="margin-left: 4em"&gt;
  &lt;ul&gt;
    &lt;li style="line-height: 20px;"&gt;
      &lt;font face="Verdana"&gt;Is the service provider storing, processing, or transmitting sensitive data?&amp;nbsp;&lt;/font&gt;

      &lt;ul&gt;
        &lt;li style="line-height: 20px;"&gt;
          &lt;font face="Verdana"&gt;Has your organization defined what sensitive data is?&amp;nbsp;&lt;/font&gt;

          &lt;ul&gt;
            &lt;li style="line-height: 20px;"&gt;&lt;font face="Verdana"&gt;PCI, PII,&amp;nbsp;patents, trade&amp;nbsp;secrets, PHI, etc.&amp;nbsp;&lt;/font&gt;&lt;/li&gt;
          &lt;/ul&gt;
        &lt;/li&gt;
      &lt;/ul&gt;
    &lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;p style="line-height: 20px;"&gt;&lt;font face="Verdana"&gt;The process used to evaluate a low-risk service provider should not be equal to&amp;nbsp;that of&amp;nbsp;a high-risk service provider. If you opt to take a broad-brush approach, your department&amp;nbsp;may be&amp;nbsp;unnecessarily&amp;nbsp;expending resources to perform&amp;nbsp;risk assessments&amp;nbsp;that extend little value to your organization.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;strong&gt;Establish a Consistent, Risk-Based Approach&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 20px;"&gt;&lt;font face="Verdana"&gt;Depending on your answers to the two questions posed above, you’ll need to determine how extensive of a review is warranted.&amp;nbsp;The&amp;nbsp;table below&amp;nbsp;can be used&amp;nbsp;as a guide when establishing a risk-based approach to perform&amp;nbsp;vendor&amp;nbsp;risk assessments.&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/p&gt;&lt;font face="Verdana"&gt;&lt;img width="942" height="273" src="https://www.ahead.com/wp-content/uploads/2021/09/Vendor-Risk-Table.png"&gt;&lt;/font&gt;

&lt;p style="line-height: 20px;"&gt;&lt;font face="Verdana"&gt;It is worth noting that&amp;nbsp;‘Limited,’&amp;nbsp;in this context,&amp;nbsp;does not mean&amp;nbsp;‘less’&amp;nbsp;review.&amp;nbsp;Rather,&amp;nbsp;it means asking&amp;nbsp;tailored questions&amp;nbsp;directly associated to criticality and/or sensitivity – whichever applies per engagement. The point here is that if a review process were defined and issued to all&amp;nbsp;vendors&amp;nbsp;regardless of criticality or sensitivity (using the&amp;nbsp;aforementioned ‘broad-brush’&amp;nbsp;approach), you would spend time requesting, collecting, and reviewing information that offers no&amp;nbsp;real&amp;nbsp;value to the organization.&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 20px;"&gt;&lt;font face="Verdana"&gt;For example,&lt;em&gt;&amp;nbsp;&lt;/em&gt;if a service provider is not providing a critical service, do you need to see a record of successful recovery testing? Conversely, if a service provider is not storing, processing, or transmitting any sensitive data on behalf of the company, do you need to validate that encryption is used?&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 24px;"&gt;&lt;strong&gt;Additional&amp;nbsp;Considerations&amp;nbsp;for the Vendor Risk Review Process&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 20px;"&gt;&lt;font face="Verdana"&gt;&lt;em&gt;The following considerations&amp;nbsp;may be helpful in&amp;nbsp;defining&amp;nbsp;a&amp;nbsp;review process; all provide&amp;nbsp;opportunities&amp;nbsp;to reduce the burden of effort associated with performing&amp;nbsp;vendor&amp;nbsp;risk assessments:&lt;/em&gt;&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;ol&gt;
  &lt;li style="line-height: 20px;"&gt;&lt;font face="Verdana"&gt;Include business purpose information,&amp;nbsp;such as source departments, relationship sponsors,&amp;nbsp;relevant&amp;nbsp;technology or applications, and dependent business processes.&amp;nbsp;Identifying&amp;nbsp;these factors&amp;nbsp;early on&amp;nbsp;will&amp;nbsp;make it easier to validate recovery capabilities or necessary data protections.&amp;nbsp;&lt;/font&gt;&lt;/li&gt;

  &lt;li style="line-height: 20px;"&gt;&lt;font face="Verdana"&gt;Include&amp;nbsp;questions&amp;nbsp;that&amp;nbsp;assess&amp;nbsp;how&amp;nbsp;critical a service is to validate that a&amp;nbsp;vendor’s recovery capabilities&amp;nbsp;are&amp;nbsp;sufficient.&amp;nbsp;If it is highly critical to operations,&amp;nbsp;this may serve as justification&amp;nbsp;to perform the review more frequently, or to gather information from process owners to determine if contingency plans exist internally.&amp;nbsp;For example, if the service is non-critical, are business continuity and disaster recovery documents or associated questions necessary&amp;nbsp;when&amp;nbsp;the contract itself stipulates SLA language specific to recovery capabilities?&amp;nbsp;&lt;/font&gt;&lt;/li&gt;

  &lt;li style="line-height: 20px;"&gt;&lt;font face="Verdana"&gt;Identify&amp;nbsp;what data is being stored, processed, or transmitted.&amp;nbsp;If&amp;nbsp;highly&amp;nbsp;sensitive&amp;nbsp;data (such as PCI or HIPAA)&amp;nbsp;is involved,&amp;nbsp;you may want&amp;nbsp;to perform the review more frequently&amp;nbsp;or&amp;nbsp;consider&amp;nbsp;specific data protection controls that must be validated before a service engagement proceeds.&amp;nbsp;&lt;/font&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p style="line-height: 20px;"&gt;&lt;font face="Verdana"&gt;In all cases, the&amp;nbsp;questionnaire&amp;nbsp;and documents&amp;nbsp;requested&amp;nbsp;should&amp;nbsp;directly&amp;nbsp;correlate to&amp;nbsp;the service provided&amp;nbsp;&lt;em&gt;and&amp;nbsp;&lt;/em&gt;actionable outcomes.&amp;nbsp;Beware of defining a broad-brush&amp;nbsp;vendor&amp;nbsp;risk assessment process designed to treat all vendors the same&amp;nbsp;way.&amp;nbsp;Instead, employ&amp;nbsp;a risk-based approach&amp;nbsp;that&amp;nbsp;will enable you to perform reviews quickly and effectively&amp;nbsp;in a manner&amp;nbsp;relevant to the service engagement. Doing so will not only provide your organization with&amp;nbsp;valuable risk&amp;nbsp;insights but&amp;nbsp;minimize&amp;nbsp;the&amp;nbsp;burden of effort&amp;nbsp;on your team and program.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 24px;"&gt;&lt;strong&gt;Monitoring&amp;nbsp;&amp;amp;&amp;nbsp;Measuring Vendor Risk&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 20px;"&gt;&lt;font face="Verdana"&gt;As the saying goes, “what is measured is improved.” Once your vendor risk review process is established, valuable data points can be gathered to increase&amp;nbsp;the&amp;nbsp;visibility of vendor risk. Here are a few metrics worth&amp;nbsp;consideration:&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 20px;"&gt;&lt;font face="Verdana"&gt;&lt;strong&gt;Vendors by Risk Categorization&lt;/strong&gt;&amp;nbsp;– Provide visibility to leadership as to what percentage of vendors are considered high risk.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 20px;"&gt;&lt;font face="Verdana"&gt;&lt;strong&gt;Vendor Risk Review by Status&lt;/strong&gt;&amp;nbsp;– Provide visibility to those managing the process, ensuring reviews are completed in a timely manner.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 20px;"&gt;&lt;font face="Verdana"&gt;&lt;strong&gt;Vendors with Authorized Risk Exceptions&lt;/strong&gt;&amp;nbsp;– Offer visibility of current risk tolerance or&amp;nbsp;an&amp;nbsp;indication that too much risk is accepted.&amp;nbsp;Not all vendors will be able to satisfy your security&amp;nbsp;requirements. In these instances, the risk should be documented and distributed to those authorized to accept risk on behalf of the company.&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 20px;"&gt;&lt;font face="Verdana"&gt;&lt;strong&gt;Vendors with Known Issues&amp;nbsp;&lt;/strong&gt;– Elevate&amp;nbsp;vendors with&amp;nbsp;known&amp;nbsp;issues to ensure&amp;nbsp;relationship&amp;nbsp;managers are aware of the issues to assist in tracking remediation efforts.&amp;nbsp;Relationship&amp;nbsp;managers can offer value to a&amp;nbsp;vendor&amp;nbsp;risk&amp;nbsp;program by acting as the liaison to help monitor and close any known issues specific to a vendor’s security program.&amp;nbsp;As risk issues are remediated, risk reduction is measurable and shows a direct benefit of the&amp;nbsp;vendor&amp;nbsp;risk&amp;nbsp;review process.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 20px;"&gt;&lt;font face="Verdana"&gt;&lt;strong&gt;Vendor Review Resulting in Benefit&lt;/strong&gt;&amp;nbsp;– Identify when&amp;nbsp;the&amp;nbsp;vendor&amp;nbsp;risk&amp;nbsp;review process results in benefit to the organization.&amp;nbsp;In some cases, information from a vendor review can strengthen contract language or offer variables that can be powerful in the contract negotiation process. Measuring these benefits can inspire the risk team to ensure that as the vendor review process continuously strengthens over time, the benefits outweigh the effort.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 24px;"&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 20px;"&gt;&lt;font face="Verdana"&gt;Having the right level of guidance&amp;nbsp;is paramount&amp;nbsp;for&amp;nbsp;organizations that are struggling to complete vendor security questionnaires or&amp;nbsp;those&amp;nbsp;that need&amp;nbsp;to&amp;nbsp;mature&amp;nbsp;their vendor risk review process.&amp;nbsp;Similar to information security risk, vendor risk is no small effort. In that spirit, it is easy to get overwhelmed and inundated with processes that offer little-to-no value to the organization. As illustrated above, the best vendor risk functions are those that are risk-based, actionable, and value-adding.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/11127496</link>
      <guid>https://www.technologyfirst.org/Tech-News/11127496</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Tue, 28 Sep 2021 20:36:37 GMT</pubDate>
      <title>The First Layer of Defense is Physical Security</title>
      <description>&lt;p&gt;&lt;font style="font-size: 18px;" color="#DD4A3A"&gt;Kathy Vogler, Communications Manager, Expedient Technology Solutions&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;I’ve lived most of my life in a relatively secure and crime free area.&amp;nbsp; I’m fortunate that my first real experience with personal property theft didn’t happen until 2010 when a trailer was stolen from our barn area.&amp;nbsp; This was completely shocking for us, at that time we didn’t lock anything including the house.&amp;nbsp; We have dogs, we have motion lights, we don’t take risky actions and there is no crime.&amp;nbsp; Well, those days are sure in the rear-view mirror, aren’t they! Everything seems to be fair game these days. The new normal must fall on the side of zero trust.&amp;nbsp; This isn’t just important to combat cybercrime, it’s for everything.&amp;nbsp; Businesses need to take physical security seriously.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;&lt;strong&gt;&lt;em&gt;&lt;font&gt;“I get hired by companies to hack into their systems and break into their physical facilities to find security holes.”&lt;/font&gt;&lt;/em&gt;&lt;/strong&gt;&lt;font&gt;~ Kevin Mitnick, 1995 convicted hacker, owner of Mitnick Security Consulting LLC&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style="background-color: white;"&gt;&lt;font style="font-size: 18px;"&gt;Physical security is the protection of people, property and physical assets in a fashion similar to steps used by law enforcement. And while the Achilles heel to security will always be the human factor, security experts agree that the three most important components of a physical security plan are access control, surveillance, and security testing.&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;&lt;strong&gt;&lt;span style="background-color: white;"&gt;&lt;font&gt;Access Control&lt;/font&gt;&lt;/span&gt;&lt;/strong&gt; &lt;span style="background-color: white;"&gt;&lt;font&gt;at a high level is about restricting access to a resource and may even be part of your regulatory compliance requirements.&amp;nbsp; Physical access control limits access and often uses a proximity card or fob, password, PIN or biometrics to unlock the door. For example, an organization may employ an electronic control system that relies on user credentials, access card readers, intercom, auditing and reporting to track which employees have access to a restricted area. This system may incorporate an access control panel that can restrict entry to individual rooms and buildings, as well as sound alarms, initiate lockdown procedures and prevent unauthorized access.&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style="background-color: white;"&gt;&lt;font style="font-size: 18px;"&gt;Access Control has five main components:&lt;/font&gt;&lt;/span&gt;&lt;/p&gt;

&lt;div style="margin-left: 2em"&gt;
  &lt;ol&gt;
    &lt;li&gt;&lt;span style="background-color: white;"&gt;&lt;font&gt;Authentication&lt;/font&gt;&lt;/span&gt;&lt;/li&gt;

    &lt;li&gt;&lt;span style="background-color: white;"&gt;&lt;font&gt;Authorization&lt;/font&gt;&lt;/span&gt;&lt;/li&gt;

    &lt;li&gt;&lt;span style="background-color: white;"&gt;&lt;font&gt;Access&lt;/font&gt;&lt;/span&gt;&lt;/li&gt;

    &lt;li&gt;&lt;span style="background-color: white;"&gt;&lt;font&gt;Manage&lt;/font&gt;&lt;/span&gt;&lt;/li&gt;

    &lt;li&gt;&lt;span style="background-color: white;"&gt;&lt;font&gt;Audit&lt;/font&gt;&lt;/span&gt;&lt;/li&gt;
  &lt;/ol&gt;
&lt;/div&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;&lt;strong&gt;&lt;span style="background-color: white;"&gt;&lt;font&gt;Surveillance&lt;/font&gt;&lt;/span&gt;&lt;/strong&gt; &lt;span style="background-color: white;"&gt;&lt;font&gt;is most often done by video cameras using a video management system.&amp;nbsp; The surveillance could start at the outer edge of your perimeter to monitor your facility and parking lots to secure your outdoor areas.&amp;nbsp; These control systems ensure that you will know who enters your facility and when. Your camera systems serve two purposes; dissuasion when a potential thief knows they will be recorded which may prevent the criminal act and if anything does happen you will have a recording of it.&amp;nbsp; IP cameras are standard and no longer require specialized equipment to handle them.&amp;nbsp; A simple computer system connected wirelessly can record.&amp;nbsp; You may even consider adding night vision. Real time alert offerings can send snap shots or video alerts directly to your phone.&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;&lt;strong&gt;&lt;span style="background-color: white;"&gt;&lt;font&gt;Security Testing&lt;/font&gt;&lt;/span&gt;&lt;/strong&gt; &lt;span style="background-color: white;"&gt;&lt;font&gt;or physical penetration testing to assess the ability of the current physical security controls to prevent penetration by the bad guys and the testing of these systems on a regular cadence to ensure their efficacy.&amp;nbsp; Many cybersecurity breaches occur when attackers find they can take advantage of one or more physical security flaw.&amp;nbsp; Flaws are as simple as no one monitoring the video feed or through devices that are easy to disarm or avoid.&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style="background-color: white;"&gt;&lt;font style="font-size: 18px;"&gt;Armed guards and strong security policies are useless if the bad guys can infiltrate by verbal deception or piggyback techniques to access your facility.&amp;nbsp; Effective staff training, procedures and personal controls like visitor records are important.&amp;nbsp; You test your employees by sending phishing emails to see if they will click, you should also test to see if your staff will allow anyone who says they have a reason to be in your facility access.&amp;nbsp; In large organizations where people don’t know everyone, it’s as easy as slipping in the door alongside someone who has authenticated.&amp;nbsp; The goal of the bad guy might be to steal property, harm your employees or plug code into a USB port of an open printer that is attached to your network.&amp;nbsp; Any action like this can cause serious disruption to your operations, ruin your company’s reputation, or steal intellectual property.&lt;/font&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;Zero Trust “Never Trust, Always Verify”&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;If the bad guys enter your front door, you should not automatically give them access to everything inside.&amp;nbsp; How long can an intruder wander around your facility before they are detected or before anyone questions them? &amp;nbsp;Will the bad guy find sensitive information laying on desks or on the copier? Are there unlocked screens at workstations, accessible phones or open USB ports? There are hundreds of things a bad guy can do in a matter of minutes; plug in a USB with malicious code, clip a vampire tap on a cable, plug in a hardwired keylogger and you are completely compromised.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;With a Zero Trust approach to your security including physical security, you can limit access and require further permissions.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;That said, and regardless of you hosting your own or outsourcing this, the interaction of every aspect of security and safety systems is most prevalent at the heart of your data and requires a comprehensive 360-degree review. &amp;nbsp;Your physical data center (on-prem or in the cloud) represents the epicenter of your customers’ and your company data and should be consistently controlled with security standards including monitoring and securing all environmental elements such as power, cooling and fire suppression.&amp;nbsp; Your data center should be the primary defense against cyber theft and any disaster that requires business continuity. Trained and experienced people keep physical and digital security systems running effectively.&amp;nbsp; Employee background checks, security and compliance training, regular access reviews, annual penetration testing against your physical infrastructure, and regular patching schedules for all systems are key.&amp;nbsp; If you outsource, are your third-party data center providers keeping your data safe? In addition to safeguarding infrastructure, do they have a plan for an active shooter?&amp;nbsp; Do they have a plan that includes hardened barriers at strategic points in the facility?&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;The world evolves and the only constant is change. Physical security and cybersecurity have the same weak link that is the human element.&amp;nbsp; It’s been said that “nice people create critical physical gaps.” Studies show that up to 60% of all people entering corporate offices do so without authentication. &amp;nbsp;Awareness and response training of your employees (not just the new employees) can go a long way to keeping your people, property, and physical assets safe.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;I’m not really ready for Zero Trust at home, but we do lock the doors now.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/11127463</link>
      <guid>https://www.technologyfirst.org/Tech-News/11127463</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Tue, 28 Sep 2021 20:32:35 GMT</pubDate>
      <title>IT Leader Spotlight: Brian Clayton</title>
      <description>&lt;p&gt;&lt;font color="#DD4A3A"&gt;Brian Clayton, IT Services Manager, HBR Consulting&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#DD4A3A"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Brian%20Clayton%20Circle.png" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;strong&gt;Did you always want to work in IT?&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;font&gt;No, the USAF chose that for me.&amp;nbsp; When I joined, I had no objective in life so when I passed the entry test open to any role I wanted I chose my ten and IT was amongst that list.&amp;nbsp; I was sent after boot camp to Biloxi to train in the Communications Group (then ISG).&amp;nbsp; My first job after the AF was not in IT, but that business moved me to manage their computer network, so I guess God was telling me my path.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;strong&gt;Tell us about your career path&lt;/strong&gt;.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;font&gt;It has always been &lt;strong&gt;&lt;em&gt;Service to others&lt;/em&gt;&lt;/strong&gt;, whether in in the military, help desk, as an enterprise architect or CIO/CISO.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;strong&gt;What business or technology initiatives will be most significant in driving IT investments in your organization in the coming year?&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;font&gt;Balancing securing and enabling businesses to deliver at their highest level, such as protecting personal data and work product while opening all doors and windows for employees to exhibit their skills and talents to the fullest.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;strong&gt;Does the conventional CIO role include responsibilities it should not hold? Should the role have additional responsibilities it does not currently include?&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;font&gt;The CIO’s responsibilities cross all lines of businesses.&amp;nbsp; I believe lines can only be drawn with mature leadership teams.&amp;nbsp; Understand your role and how it affects and is affected by the others on your team.&amp;nbsp; The CIO must also be an enabler not just a wall.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;strong&gt;What does a good culture fit look like in your organization? How do you cultivate it?&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;font&gt;A team respecting their role on the team and the expertise that surrounds them.&amp;nbsp; This doesn’t mean to sit still, it means to evolve together, welcome new team members, congratulate those who graduate and move to other teams.&amp;nbsp; Understand sometimes people suck, we all do at some point.&amp;nbsp; But the respect and commitment to the team will get you out of those holes and allow you to move forward again.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;strong&gt;What roles or skills are you finding (or anticipate to be) the most difficult to fill?&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;T&lt;font&gt;echnically skilled who can have user empathy balanced with being technically skilled.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;strong&gt;What’s the best career advice you ever received?&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;font&gt;Deliver on your promises and share the rewards with all who joined in on your battles.&amp;nbsp; Those people that challenge you the most are setting the bar for your next achievement.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;strong&gt;What has been your greatest career achievement?&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;font&gt;To love and be loved by those I have worked with along the way.&amp;nbsp; Don’t destroy the path behind you.&amp;nbsp; It is a part of you forever.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;strong&gt;Looking back with 20/20 hindsight, what would you have done differently?&lt;/strong&gt;&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;font&gt;Changing my mistakes in the past might very well change where I am today.&amp;nbsp; Physical features of weight aside, I am happy where I am today.&amp;nbsp; Just learn from those mistakes for tomorrow, look forward.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/11127438</link>
      <guid>https://www.technologyfirst.org/Tech-News/11127438</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Tue, 28 Sep 2021 17:39:35 GMT</pubDate>
      <title>Create a Ransomware Incident Response Plan - Webinar</title>
      <description>&lt;p style="line-height: 22px;"&gt;&lt;font face="Verdana" style="font-size: 18px;" color="#DD4A3A"&gt;Info-Tech Research Group&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 22px;"&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Ransomware is now a daily news item. Having an effective and formalized response plan in place is more important than ever. Organizations are considering how to prepare and respond, whether they need cyberinsurance, and how it all works with their business continuity.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 22px;"&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Join us in this webinar where we will address how to:&lt;/font&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li style="line-height: 22px;"&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Assess your ransomware preparedness.&lt;/font&gt;&lt;/li&gt;

  &lt;li style="line-height: 22px;"&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Document a formal response plan.&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;font&gt;Include ransomware events in business continuity planning.&lt;/font&gt;&lt;/font&gt;

&lt;p&gt;&lt;a href="https://www.youtube.com/watch?v=JevVsX_nt-s" target="_blank"&gt;&lt;font face="Verdana" style="font-size: 18px;" color="#4D5758"&gt;View Webinar&lt;/font&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/11127164</link>
      <guid>https://www.technologyfirst.org/Tech-News/11127164</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Mon, 27 Sep 2021 21:49:54 GMT</pubDate>
      <title>Melissa Cutcher, Executive Director of Technology First, wins local award!</title>
      <description>&lt;P&gt;&lt;FONT face="Verdana" style="font-size: 18px;"&gt;&lt;IMG src="https://mostmetro.com/wp-content/uploads/2021/09/women-of-impact-22.png"&gt;&lt;BR&gt;&lt;/FONT&gt;&lt;/P&gt;

&lt;P&gt;&lt;FONT face="Verdana" style="font-size: 18px;"&gt;The Better Business Bureau’s Women in Business Networking (WiBN) program is thrilled to announce the 2022 Women of Impact honorees, as well as Jeanne Porter Career Achievement Award recipient.&lt;/FONT&gt;&lt;/P&gt;

&lt;P&gt;&lt;FONT face="Verdana" style="font-size: 18px;"&gt;Women of Impact honorees are dynamic professional women who have been recognized for inspiring and encouraging those around them to actively challenge the status quo, working to improve their communities, develop their employees and advocate for women in general. Rather than being content with others just watching them work, these women involve those around them in their endeavors thereby increasing their collective impact. They understand we are “BETTER TOGETHER.”&lt;/FONT&gt;&lt;/P&gt;

&lt;P&gt;&lt;FONT face="Verdana" style="font-size: 18px;"&gt;&lt;IMG src="https://www.technologyfirst.org/resources/Pictures/Headshots/melissa%20cutcher.png" border="0"&gt;&lt;BR&gt;&lt;/FONT&gt;&lt;/P&gt;

&lt;P&gt;&lt;FONT face="Verdana" style="font-size: 18px;"&gt;&lt;FONT&gt;&lt;SPAN&gt;&lt;FONT&gt;Melissa Cutcher, Technology First, will be the recipient of the 2022 Jeanne Porter Career Achievement Awa&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;SPAN&gt;rd. This honor is presented annually to a woman who continues to inspire, influence&amp;nbsp;and impact the business community and the world around them well beyond their initial recognition as a WiBN Top 25 Woman. This award is meant to recognize an impactful professional legacy, like that of Jeanne Porter, founder of WiBN.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;

&lt;P&gt;&lt;SPAN&gt;&lt;FONT face="Verdana" style="font-size: 18px;"&gt;&lt;STRONG&gt;2022 Women of Impact include:&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;

&lt;UL&gt;
  &lt;LI&gt;Sheri Aldridge, New Beginnings for You&lt;/LI&gt;

  &lt;LI&gt;Molly Bardine, Chaminade Julienne&lt;/LI&gt;

  &lt;LI&gt;Cassie Barlow, Col. USAF Ret. &amp;amp; SOCHE&lt;/LI&gt;

  &lt;LI&gt;Judy Budi, Graceworks Lutheran Services&lt;/LI&gt;

  &lt;LI&gt;Janet Carpenter, Sophie‘s companions for Veterans/Sophie Kerrigan&amp;nbsp; For the love of Animals Foundation&lt;/LI&gt;

  &lt;LI&gt;Joyce Carter, Montgomery County&lt;/LI&gt;

  &lt;LI&gt;Pamela Cone, Aviatra Dayton &amp;amp; Curated Conversations&lt;/LI&gt;

  &lt;LI&gt;Lissa Cupp, Big Rocks of Life &amp;amp; Style Encore&lt;/LI&gt;

  &lt;LI&gt;Angela Dugger, National Alliance on Mental Illness&lt;/LI&gt;

  &lt;LI&gt;Lois Elrich, Real Change Business Coaching&lt;/LI&gt;

  &lt;LI&gt;Denise Henton, Single Parents Rock&lt;/LI&gt;

  &lt;LI&gt;Karlee Mason, Picnk, LLC&lt;/LI&gt;

  &lt;LI&gt;Anita Moore, A. Moore Consulting&lt;/LI&gt;

  &lt;LI&gt;Dr. Shanee Pacley, Wright Patterson Air Force Research Laboratory&lt;/LI&gt;

  &lt;LI&gt;Robyn R. Razor, Mount Carmel East&lt;/LI&gt;

  &lt;LI&gt;Dr. Rhonda Smith, Divine Core Transformation &amp;amp; Renewed Health Care Practice&lt;/LI&gt;

  &lt;LI&gt;Yvonne Turner, BSN, CHPN, CNS, Ohio’s Hospice&lt;/LI&gt;

  &lt;LI&gt;Lisa Wagner, Levitt Pavilion Dayton&lt;/LI&gt;

  &lt;LI&gt;Natalie Walters, WKEF/WRGT&lt;/LI&gt;

  &lt;LI&gt;Erika Ward, Ronald McDonald House Charities of Dayton&lt;/LI&gt;
&lt;/UL&gt;

&lt;P&gt;&lt;BR&gt;&lt;/P&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/11127607</link>
      <guid>https://www.technologyfirst.org/Tech-News/11127607</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Mon, 27 Sep 2021 21:40:17 GMT</pubDate>
      <title>Meet XDR: A New Approach to Threat Detection and Response</title>
      <description>&lt;p style="line-height: 20px;"&gt;&lt;font face="Verdana" style="font-size: 18px;" color="#DD4A3A"&gt;Cadre Information Security&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 20px;"&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;You’ve probably heard about it. Maybe you wrote it off as just another product on your cybersecurity bingo card? It is Extended Detection and Response (XDR)—cybersecurity’s “next big thing.”&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 20px;"&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Could it be the security management technology of your dreams? Let’s find out. We’re diving right in to give you an up close look at the technical evolution that vendors seem to be going gaga over. And, we’ll let you judge for yourself.&lt;/font&gt;&lt;/p&gt;

&lt;h3 style="line-height: 17px;"&gt;&lt;strong&gt;&lt;font face="Verdana" style="font-size: 18px;" color="#4D5758"&gt;What is XDR Anyway?&lt;/font&gt;&lt;/strong&gt;&lt;/h3&gt;

&lt;p style="line-height: 20px;"&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Before we define XDR, it might be helpful to create context with Endpoint Detection and Response (EDR). As endpoints proliferate, organizations are focusing more attention on securing workstations. To do this, EDR provides two essential functionalities:&lt;/font&gt;&lt;/p&gt;

&lt;ol&gt;
  &lt;li&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Continuous monitoring and threat detection.&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Follow up of automated responses to threats discovered during the monitoring phase.&lt;/font&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p style="line-height: 20px;"&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;font&gt;While EDR provides essential visibility and control over threats to endpoints, threat actors do not focus solely on laptops, desktops, mobile phones, and other devices. Rather, they find the entry point of least resistance and escalate their privileges to move laterally until they reach their intended target.&lt;/font&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 20px;"&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;font&gt;To block and disrupt threats effectively, organizations need to go beyond EDR with extended, real-time visibility into security events not only for your endpoints, but for cloud workloads and the network. XDR achieves this by collecting and correlating data across all channels to enable visibility and context into&amp;nbsp;&lt;/font&gt;&lt;a href="https://blog.cadre.net/the-solar-winds-breach-what-your-business-can-learn-from-it"&gt;&lt;font&gt;advanced threats&lt;/font&gt;&lt;/a&gt;&lt;font&gt;. After alerting analysts, threats can be analyzed, prioritized based on risk, hunted, and remediated to prevent breaches and data loss.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;h3 style="line-height: 17px;"&gt;&lt;font&gt;&lt;strong&gt;&lt;font face="Verdana" style="font-size: 18px;" color="#4D5758"&gt;But I Have a SIEM for That&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/h3&gt;

&lt;p style="line-height: 20px;"&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;As with many security solutions, some features of XDR and SIEM overlap. Because of this, customers tend to ask if XDR adds value in environments that already have a SIEM solution deployed.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 20px;"&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;The distinction starts from the very beginnings of each product. SIEM had its genesis in compliance. Over time, SIEM evolved to a threat and operational risk platform, pulling data from disparate sources, performing automated analysis, and alerting human analysts. However, it does not include some of the broader functionality that XDR encompasses.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 20px;"&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Unlike SIEM, from day one XDR was developed to focus on threats and to provide a single platform for deeper and narrower threat detection and response. Seen as the next generation of EDR, XDR includes additional functions like antivirus, firewall, and of course, EDR.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 20px;"&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;More specifically, XDR differentiates from other product categories in three ways:&lt;/font&gt;&lt;/p&gt;

&lt;ol&gt;
  &lt;li&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Level of turnkey integration is much higher and does not require expensive, labor-intensive calibration.&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Squarely focused on threat detect and incident response and have a higher quality detection and analysis lab.&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Generally built on cloud-native architectures and can be rapidly deployed.&lt;/font&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;h3 style="line-height: 17px;"&gt;&lt;font&gt;&lt;strong&gt;&lt;font face="Verdana" style="font-size: 18px;" color="#4D5758"&gt;Is XDR Right for Your Business?&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/h3&gt;

&lt;p style="line-height: 20px;"&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;As vendors begin to take their XDR offerings to market, we have seen it appear in different forms—hardware companies adding standalone XDR products while traditional enterprise security companies add XDR as an extension of their existing platform. Given the range of options, there is certainly an XDR for every need.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 20px;"&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;font&gt;But, is there a need for every XDR? Sometimes you don’t know until it’s too late. Or instead of waiting, you can try finding your security program holes through a pen test. Read more in our blog,&amp;nbsp;&lt;/font&gt;&lt;a href="https://blog.cadre.net/what-are-the-different-types-of-pen-testing"&gt;&lt;strong&gt;&lt;font&gt;&lt;em&gt;What are the different types of Pen Testing?&lt;/em&gt;&lt;/font&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/11127593</link>
      <guid>https://www.technologyfirst.org/Tech-News/11127593</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Mon, 27 Sep 2021 21:38:41 GMT</pubDate>
      <title>Face the Facts: 3 Cloud Security Realities</title>
      <description>&lt;p&gt;&lt;font face="Verdana" color="#DD4A3A"&gt;Greg Franseth, Cadre Information Security&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;font&gt;The internet is chock-full of cloud growth stats. We all know it’s happening, but do we really know how great our security risk is? According to our friends over at Netskope, in 2020, the number of apps in use by the average enterprise increased by 20%[1]. Organizations with 500-2,000 employees used on average 690 distinct cloud apps. Of those apps, 47.5% have a “Poor” Cloud Confidence Index™ (CCI) rating—meaning enterprises should avoid using these apps and take steps to migrate to safer app alternatives.&lt;br&gt;
&lt;br&gt;
And that’s just a glimpse into the current state of cloud security.&lt;br&gt;
&lt;br&gt;
With so much of today’s work rooted in the cloud, it’s easy to get wrapped up in doing everything you can to improve your organization’s cloud security posture. But these days what we’re seeing is that IT teams need to take a pause and revisit these 3 need-to-know security facts.&lt;br&gt;
&lt;br&gt;
&lt;strong&gt;1. Everyone’s cloud security stack still needs to be tailored.&lt;/strong&gt;&lt;br&gt;
&lt;br&gt;
“More cloud security doesn’t equate to stronger security” is something you have probably read time and time again. But it’s worth repeating. Why? Because as the attack surface keeps expanding, organizations keep falling into the same pattern. There’s an issue, they buy a security solution to stop the hemorrhage or meet a compliance requirement, and then put off dealing with the complexity issues for another day.&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;br&gt;
&lt;br&gt;
The real problem is that cloud complexity combined with too many different and uncooperative security solutions leaves you with no shared intelligence.&lt;br&gt;
&lt;br&gt;
To overcome these challenges, you must streamline your security stack and include must-haves like: Cloud Access Security Broker (CASB) as part of your&amp;nbsp;&lt;a href="https://blog.cadre.net/secure-access-service-edge-sase-getting-sassy-in-the-cloud"&gt;&lt;font&gt;Secure Access Service Edge (SASE)&lt;/font&gt;&lt;/a&gt;, Identity and Access Management (IAM), threat intelligence, and next-generation firewalls. And do so in a strategic manner that ensures all solutions work in harmony.&lt;br&gt;
&lt;br&gt;
&lt;strong&gt;2. Constant vigilance is the only way forward.&lt;/strong&gt;&lt;br&gt;
&lt;br&gt;
So much of the discussion on cloud security revolves around technology. However, it’s not the IT team’s problem alone. Today, people are the weakest link in security. Even with a cloud-based SWG, if an employee clicks on a phishing email and enters their credentials, your whole cloud ecosystem could be at risk as attackers stealthily move and escalate privileges. While artificial intelligence (AI) and machine learning (ML) technologies help with predicting these events, and isolation layers can keep phishing attempts and malware off endpoint devices,&amp;nbsp;&lt;a href="https://www.cadre.net/security-awareness-program-design?hsCtaTracking=0ba78a50-eba8-4a2d-90ee-f3f24e2fe779%7Cd6cac12e-d715-4fe1-8375-f48c7c9d842a"&gt;&lt;font&gt;awareness&lt;/font&gt;&lt;/a&gt;&amp;nbsp;is still a central pillar of keeping the cloud secure.&lt;br&gt;
&lt;br&gt;
&lt;strong&gt;3. You have to use ML/AI to take the load off analysts so they can keep a human eye on end users.&amp;nbsp;&lt;/strong&gt;&lt;br&gt;
&lt;br&gt;
The cloud can be safer, but you’ll always need real-time monitoring and analysis of end-user behavior. This will allow you to spot irregularities that deviate from normal usage patterns (did they modify audit trails, did they repeatedly try to download data, etc.). And at the other end of the spectrum, when that employee departs the company, do you have a process to ensure they can no longer access your cloud storage, systems, data, customer information, and intellectual properties?&lt;br&gt;
&lt;br&gt;
To address these issues, consider completing an&amp;nbsp;&lt;a href="https://www.cadre.net/assessments"&gt;&lt;font&gt;assessment&lt;/font&gt;&lt;/a&gt;&amp;nbsp;before buying any new solutions that use AI/ML to complete low-level, high-volume tasks to take the burden of human experts such as:&lt;br&gt;
&amp;nbsp;&lt;br&gt;
&lt;br&gt;
· &amp;nbsp; &amp;nbsp; &amp;nbsp; Intrusion Detection &amp;amp; Response&lt;br&gt;
&lt;br&gt;
· &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;a href="https://blog.cadre.net/meet-xdr-a-new-approach-to-threat-detection-and-response"&gt;&lt;font&gt;Extended Detection and Response&lt;/font&gt;&lt;/a&gt;&lt;br&gt;
&lt;br&gt;
· &amp;nbsp; &amp;nbsp; &amp;nbsp; SIEM&lt;/font&gt;&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;strong&gt;&lt;font&gt;&lt;strong&gt;Cloud-First Must be Security-First&lt;/strong&gt;&lt;/font&gt;&lt;/strong&gt;&lt;br&gt;
&lt;br&gt;
&lt;font&gt;As a bonus fact, to reap the benefits of cloud computing, organizations must put security first on the list of priorities. While cloud is more secure if you take the right precautions, it takes constant evaluation and re-evaluation to ensure you have the best solutions for your ecosystem. At Cadre, we work with the best cloud security providers in the business and take an unbiased approach to review and recommend how to best secure your unique environment and reduce risk.&lt;/font&gt;&lt;br&gt;
&lt;br&gt;
&lt;font&gt;To learn more about integral parts of today’s cloud security, watch our recorded webinar,&amp;nbsp;&lt;/font&gt;&lt;a href="https://www.cadre.net/demystifying-sase-a-cloud-based-approach-to-network-security?hsCtaTracking=cbe114f8-6915-4c18-b6e1-d0f94dbee808%7Cc7acc61e-c65f-481a-8e06-d6176c491cd9"&gt;&lt;font&gt;Demystifying SASE - A Cloud-Based Approach to Network Security&lt;/font&gt;&lt;/a&gt;&lt;font&gt;.&lt;/font&gt;&lt;br&gt;&lt;/font&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/11127575</link>
      <guid>https://www.technologyfirst.org/Tech-News/11127575</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Mon, 27 Sep 2021 21:37:31 GMT</pubDate>
      <title>Minimize Security Incidents with a Strong Security Awareness Program</title>
      <description>&lt;p style="line-height: 20px;"&gt;&lt;font face="Verdana" color="#DD4A3A"&gt;Monique Little, Cadre Information Security&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 20px;"&gt;&lt;font face="Verdana"&gt;News of companies getting hacked is omnipresent. The fear, uncertainty, and doubt as a result of these reports can make you want to give up. But don’t let that dissuade you—there’s still hope and it resides in an unusual fact: more than 99% of today’s cyber attacks are human-activated.&lt;sup style=""&gt;1&lt;/sup&gt;&lt;br&gt;
&lt;br&gt;
You might think to yourself,&amp;nbsp;&lt;em style=""&gt;how is that good?&lt;/em&gt;&amp;nbsp;Well, for one thing, human behavior can be changed. It just requires a strong Security Awareness Program.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 20px;"&gt;&lt;font face="Verdana"&gt;&lt;strong&gt;Security Awareness is More than Phishing Campaigns&lt;/strong&gt;&lt;br&gt;
&lt;br&gt;
Running phishing simulations is a common security education practice, but it is only one component among many other tactics. When we boil it down, Security Awareness is teaching employees how to develop a strong security mindset both at work and at home. That could mean using townhalls, chat channels, newsletters, and informal and formal trainings to enhance cybersecurity best practice knowledge.&lt;br&gt;
&lt;br&gt;
Security Awareness is … not holding the door open for the person behind you, even though human nature tells you it’s common courtesy. It’s learning that threat actors leave USB drives behind and hope someone will plug it into their computer to see what’s on it (it’s in our nature as humans to be curious). It’s being aware that hackers use social media to see what your title is at work so they know who to target. It’s training employees to trust, but verify. Just because she says she’s there to fix the printer and name-drops so that it sounds legit, doesn’t make it so; always verify before leading anyone into your office space. Remember, these are just a few examples of social engineering attacks, not an exhaustive list.&lt;br&gt;
&lt;br&gt;
&lt;strong&gt;When Security Incidents Happen&lt;/strong&gt;&lt;br&gt;
&lt;br&gt;
When an attack or breach occurs, what often has the most influence on the end result is how the organization reacts—and, how they learn from the event.&lt;br&gt;
&lt;br&gt;
Post-event, it is critical to evaluate using these questions:&lt;br&gt;
&lt;br&gt;
-How did the targeted user react?&lt;br&gt;
-How did IT react?&lt;br&gt;
-What went great?&lt;br&gt;
-What opportunities are there for improvement?&lt;br&gt;
-Are security tools configured correctly?&lt;br&gt;
-Do you have a Security Awareness Program in place? How did it prepare the affected parties?&lt;br&gt;
-Do you know what to do in case of a suspected incident?&lt;br&gt;
&lt;br&gt;
&lt;strong&gt;What to Do: The #1 Rule&lt;/strong&gt;&lt;br&gt;
&lt;br&gt;
Knowing what to do in the case of a suspected incident is paramount. Messaging to all staff needs to be clear and encourage communication and participation. Good organizational responses should emphasize positive, defensive behaviors. This is true from the CEO to the receptionist, and to the head of IT. No matter who you are, if you have the slightest suspicion that you are experiencing an attack or have been infected with malware, don’t wait to confirm. End users need to know that IT departments would prefer false alarms than be kept in the dark about potential attacks. If anything gives an end-user pause, it should be reported immediately to IT.&lt;br&gt;
&lt;br&gt;
It is important to note that an event or an incident is not synonymous with the B-word (rhymes with reach). Anything that happens on a network—even a false positive—is categorized as an incident. That doesn’t mean that your data has been compromised. Organizations can tie themselves in knots in fear of a public relations fallout only to discover there was never anything there. Don’t allow nomenclature to dictate how you respond.&lt;br&gt;
&lt;br&gt;
&lt;strong&gt;Be Sure Users Know This&lt;/strong&gt;&lt;br&gt;
&lt;br&gt;
Do the users in your organization know how to contact your IT department in case of a suspected incident?&lt;br&gt;
&lt;br&gt;
Make sure that all employees know how to contact IT during business hours, after hours or on weekends/holidays. And most importantly, how to contact IT if their email or whole computer has been compromised. Users should have email addresses, desk phone numbers and cell phone numbers of the appropriate IT contacts.&lt;br&gt;
&lt;br&gt;
&lt;strong&gt;Debunking the Biggest Cybersecurity Misconception&lt;/strong&gt;&lt;br&gt;
&lt;br&gt;
&lt;em&gt;The IT and security team are solely responsible for the organization’s cybersecurity posture.&lt;/em&gt;&amp;nbsp;That couldn’t be further from the truth. But it underpins the importance of starting, and maturing, a Security Awareness Program.&lt;br&gt;
&lt;br&gt;
Everyone in the organization is responsible for remaining diligent to protect business, employee, and client data. However, not everyone thinks this way. End-users must be educated in the role they play, and how “good” cybersecurity behavior isn’t simply beneficial to the business, but their own personal lives.&lt;br&gt;
&lt;br&gt;
There is no technology that can stop all social engineering attacks since they rely on exploiting human nature—you must have ingrained security awareness as your first line of defense.&lt;br&gt;
&lt;br&gt;
Having a strong Security Awareness Program can help to minimize security incidents within your organization. If employees know what to look for, they can do their parts to help keep your organization’s data secure. If you have questions about or need assistance in building a strong Security Awareness Program within your organization, please&amp;nbsp;&lt;a href="https://www.cadre.net/contact-us-?hsCtaTracking=9b94c9a4-1a97-4c05-bbac-3f29466a6d6b%7C42bfc841-2da2-4c3d-b096-2881557cd80f" target="_blank"&gt;&lt;font&gt;contact us&lt;/font&gt;&lt;/a&gt;.&amp;nbsp;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/11127574</link>
      <guid>https://www.technologyfirst.org/Tech-News/11127574</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Tue, 31 Aug 2021 16:00:36 GMT</pubDate>
      <title>One more reason why estimating software projects can be so challenging</title>
      <description>&lt;p&gt;&lt;font color="#DD4A3A"&gt;Smart Data Systems&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;If you lead an organization that is required to estimate software development projects, you may already know estimating software development is not easy. In fact, the entire topic of estimating software is often a contentious one within many organizations. Whether that is internal stakeholders or clients who have a desire to know what will be delivered and when, or a software development team that is hesitant to create something that stakeholders will use against them. A lot of this frustration and the challenges surrounding estimating this type of work stems from a belief that software developers should be good at estimating in the first place.&lt;/p&gt;

&lt;p&gt;Don’t get me wrong, we humans are amazing creatures in so many ways. We have the capacity to solve complex problems, make technological advances that have made all of our lives easier and more enjoyable. And yet, despite all those achievements, we still fall prey to flawed thinking and in general humans are not always great at estimating many complex challenges. While not all software projects are complex, many tend to be and one very real reason why is how we think about complex problems and how being more aware of where that thinking can go wrong.&lt;/p&gt;

&lt;p&gt;A great book on the process of thinking that highlights some of these basic mistakes is Thomas Kida’s &amp;nbsp;“Don’t Believe Everything You Think, The Six Mistakes We Make in Thinking”. While not specifically about software estimating, it does provide some very interesting insights and research on why most humans can make common mistakes in how they are applying critical thinking&lt;/p&gt;

&lt;p&gt;The six basic mistakes are:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;·&lt;font style="font-size: 9px;" face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; We have faulty memories&lt;/li&gt;

  &lt;li&gt;·&lt;font style="font-size: 9px;" face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; We tend to oversimplify our thinking&lt;/li&gt;

  &lt;li&gt;·&lt;font style="font-size: 9px;" face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; We sometimes misperceive the world around us&lt;/li&gt;

  &lt;li&gt;·&lt;font style="font-size: 9px;" face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; We rarely appreciate the role of chance and coincidence in shaping events&lt;/li&gt;

  &lt;li&gt;·&lt;font style="font-size: 9px;" face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; We seek to confirm, not to question, our ideas&lt;/li&gt;

  &lt;li&gt;·&lt;font style="font-size: 9px;" face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; We prefer stories to statistics&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;One common challenge for software teams is what is often called “the problem of perfection” or the pressure to provide “perfect” estimates. Most good teams can empathize with the need to prioritize work, the love of metrics, and the all too common need to push for estimates of work that will tell you when something will be “done”.&amp;nbsp; What can often happen with or without this pressure is good teams or developers will fall into one of Mr. Kida’s six mistakes which is our human tendency to oversimplify our thinking.&lt;/p&gt;

&lt;p&gt;Heuristics or general rules of thumb are what most of us use to try to effectively simplify complicated judgments we need to make. They also can give us good approximate solutions to our problems. The great news is approximate solutions are surprisingly very effective and for many project estimates they can provide teams with good estimates and can keep many organizations from following into the “Perfect is the enemy of good” rut. However, the challenge is those same rules of thumbs can also lead to systematic biases that result in grossly inaccurate judgments. A common mistake is our “representativeness” rule of thumb or “of course it’s the same, it looks the same doesn’t it.” This method of oversimplification works well for many decisions as things that go together can often be similar in development. However, things will go off the tracks with this way of thinking, if enough other relevant data is overlooked, and thus often can lead to major decision errors. This is sometimes reflected in a piece of development that was done by one group of developers so the natural thought would be, it’s the same relative size of work so the new work must take the same number of hours.&amp;nbsp; A is similar to B, so therefore they must be equal, right? Factor in the relevant data that the previous development team was made up of six people all with two or more years of experience in working with this same solution and your new team consists of only two of those same people and now two new people that started last month. Is that still similar?&lt;/p&gt;

&lt;p&gt;The great news is simplifying as a thinking strategy is not all bad. In fact, simplifying strategies will serve you quite well in most software development estimates, just remember to recognize that oversimplifying, with little or no relevant data, and your own biases will lead to major problems with how your team thinks and estimates. I would also suggest looking at more of Thomas Kida’s work or the work of others to understand how we think about problems and see if it can’t help you or your teams with your process of estimating software development.&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10972103</link>
      <guid>https://www.technologyfirst.org/Tech-News/10972103</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Mon, 30 Aug 2021 18:51:35 GMT</pubDate>
      <title>Technology First &amp; Software Development</title>
      <description>&lt;a href="https://www.technologyfirst.org/Taste-of-IT/" target="_blank"&gt;Registration &amp;amp; Details Here!&lt;/a&gt;

&lt;p&gt;&lt;font color="#DD4A3A" style="font-size: 18px;"&gt;&lt;font&gt;Don Kennedy, Smart Data Systems and the&amp;nbsp;&lt;/font&gt;Technology First Board of Directors&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;“We are uncovering better ways of developing software by doing it and helping others do it”&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;-Agile Manifesto, 2001&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 20px;"&gt;&lt;font style="font-size: 18px;"&gt;There is a lot of talk in and outside of the technology community about “being agile” and helping organizations increase their ability to react quickly to what seems to be an ever-changing business environment. Just in the last 18 months we have seen unprecedented spikes of demand on Health care, Manufacturing, and Logistics systems as well as perceived permanent shifts in where and how we work, shop, and visit our physicians. &amp;nbsp;At the heart of all of these changes are millions of lines of code written by craftswomen and craftsmen. Software development and engineers continue to be at the forefront of an accelerating digital change and why Technology First is proud to continue to support this community at the heart of it all. In this month’s edition we wanted to highlight some of the ideas, people, and practices from this important part of our community&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 20px;"&gt;&lt;font style="font-size: 18px;"&gt;One set of principles deeply entrenched in this part of the technology world are Agile Principles. They are now over twenty years old and you would assume many of us may have felt or heard of them as you worked with your developers or technical teams. While often confused with the adjective Agile, the Agile Manifesto is actually a set of principles that have evolved and continue to very much be an effective and sustainable way of working for many organizations around the world. While there also continues to be some misunderstanding of the Agile manifesto and Agile community, I hope to demystify some of what being “Agile” means to many within the software community.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 20px;"&gt;&lt;font style="font-size: 18px;"&gt;Allow me first to give a very brief history of where some of these principles came from as I think this lays important groundwork. I will apologize in advance as with any history many things are lost and, in an attempt to be concise, it can be difficult to give it the adequate coverage it deserves. But in 2001 and growing out of sympathy for the need to find alternatives to documentation-driven, heavyweight software development processes, seventeen people, some competitors and most very independent thinkers, documented specific ideas they believed would provide that alternative. Underneath this manifesto of ideas are the bedrock themes of values and culture. So the manifesto and principles are really nothing more than a set of values that was intended to underpin and promote an organizational model based on People, Collaboration, and the Organizations models in which the original group would want to work.&amp;nbsp; What has since grown out of those original ideas is a celebration of a sustainable, quality, process model that works to hold up the idea that “people are our most important asset”.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 20px;"&gt;&lt;font style="font-size: 18px;"&gt;With that history under us, I would also highlight critics of the principles will often confuse the original ideas and all too often accuse “Agilest” of being anti-methodology, anti-modeling, and completely against documentation. These are all incorrect beliefs, but a common theme among many critics in this way of working and building software. What the principles are and how people incorporate them into their way of working is a much longer subject that I could not begin to cover here, but my understanding is these principles stand more for certain principles than they are against anything if that makes sense. This is also where I will maybe get into a little trouble and admit some people do hide behind some of these ideas, like humans can, and will use them to fight against certain processes more than maybe they should. That said, inherently the principles are again about balance in planning, or documentation, etc. So while the principles highly value Individuals and interactions over process and tools, nowhere do these principles say you should not embrace documentation, planning, or methodologies. I will also admit I am very much a traditionalist when it comes to business in many ways and while I work with many developers, I am not a software developer myself, so it has taken me time and first hand witnessing the value of these principles to come to a better understanding of the intrinsic value they bring to people, teams, and entire businesses. While we do not have adequate time to cover these principles here I hope this brief piece and the principles themselves below will help in some way to provide insights to those unfamiliar with Agile practices. If nothing else, I would encourage you to remain open to the idea that as humans we can fall into habits and ruts of behavior all too easily and practicing new ways of working can have unforeseen benefits.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 20px;"&gt;&lt;font style="font-size: 18px;"&gt;What follows is the manifesto itself and the twelve principles of Agile Software freely copied in its entirety from https://agilemanifesto.org/&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;font color="#000000" style="font-size: 18px;" face="Verdana"&gt;We are uncovering better ways of developing&lt;br&gt;
software by doing it and helping others do it.&lt;br&gt;&lt;/font&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;font color="#000000" style="font-size: 18px;" face="Verdana"&gt;Through this work we have come to value:&lt;/font&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;" face="Verdana"&gt;&lt;strong&gt;&lt;em&gt;&lt;font color="#000000"&gt;Individuals and interactions&lt;/font&gt;&lt;/em&gt;&lt;/strong&gt;&lt;em&gt;&lt;font color="#000000"&gt;&amp;nbsp;over processes and tools&lt;br&gt;
&lt;strong&gt;Working software&lt;/strong&gt;&amp;nbsp;over comprehensive documentation&lt;br&gt;
&lt;strong&gt;Customer collaboration&lt;/strong&gt;&amp;nbsp;over contract negotiation&lt;br&gt;
&lt;strong&gt;Responding to change&lt;/strong&gt;&amp;nbsp;over following a plan&lt;/font&gt;&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;font color="#000000" style="font-size: 18px;" face="Verdana"&gt;That is, while there is value in the items on&lt;br&gt;
the right, we value the items on the left more.&lt;/font&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;&lt;u&gt;&lt;font color="#000000" style="font-size: 18px;"&gt;We follow these principles:&lt;/font&gt;&lt;/u&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;font color="#000000" style="font-size: 16px;"&gt;Our highest priority is to satisfy the customer&lt;br&gt;
through early and continuous delivery&lt;br&gt;
of valuable software.&lt;/font&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;font color="#000000" style="font-size: 16px;"&gt;Welcome changing requirements, even late in&lt;br&gt;
development. Agile processes harness change for&lt;br&gt;
the customer's competitive advantage.&lt;/font&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;font color="#000000" style="font-size: 16px;"&gt;Deliver working software frequently, from a&lt;br&gt;
couple of weeks to a couple of months, with a&lt;br&gt;
preference to the shorter timescale.&lt;/font&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;font color="#000000" style="font-size: 16px;"&gt;Business people and developers must work&lt;br&gt;
together daily throughout the project.&lt;/font&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;font color="#000000" style="font-size: 16px;"&gt;Build projects around motivated individuals.&lt;br&gt;
Give them the environment and support they need,&lt;br&gt;
and trust them to get the job done.&lt;/font&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;font color="#000000" style="font-size: 16px;"&gt;The most efficient and effective method of&lt;br&gt;
conveying information to and within a development&lt;br&gt;
team is face-to-face conversation.&lt;/font&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;font color="#000000" style="font-size: 16px;"&gt;Working software is the primary measure of progress.&lt;/font&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;font color="#000000" style="font-size: 16px;"&gt;Agile processes promote sustainable development.&lt;br&gt;
The sponsors, developers, and users should be able&lt;br&gt;
to maintain a constant pace indefinitely.&lt;/font&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;font color="#000000" style="font-size: 16px;"&gt;Continuous attention to technical excellence&lt;br&gt;
and good design enhances agility.&lt;/font&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;font color="#000000" style="font-size: 16px;"&gt;Simplicity--the art of maximizing the amount&lt;br&gt;
of work not done--is essential.&lt;/font&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;font color="#000000" style="font-size: 16px;"&gt;The best architectures, requirements, and designs&lt;br&gt;
emerge from self-organizing teams.&lt;/font&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;font color="#000000" style="font-size: 16px;"&gt;At regular intervals, the team reflects on how&lt;br&gt;
to become more effective, then tunes and adjusts&lt;br&gt;
its behavior accordingly.&lt;/font&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;&lt;strong&gt;&lt;font&gt;Please join us at the Taste of IT this November 17&lt;sup&gt;th&lt;/sup&gt; and look at our developer track for more interesting content around software development and its practices! &lt;a href="https://www.technologyfirst.org/Taste-of-IT/" target="_blank"&gt;Registration and Details here!&lt;/a&gt;&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;&lt;br&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10972101</link>
      <guid>https://www.technologyfirst.org/Tech-News/10972101</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Mon, 30 Aug 2021 18:46:48 GMT</pubDate>
      <title>Beware the MVP</title>
      <description>&lt;p&gt;&lt;font color="#DD4A3A"&gt;Dave Best, Technical Director, Mile Two&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font&gt;“Minimum Viable Product,” or MVP, is a well-known acronym in the software and product development community. Eric Ries popularized this term in the book, The Lean Startup. He describes the MVP as:&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font&gt;“[...] &lt;em&gt;the minimum viable product is that version of a new product which allows a team to collect the maximum amount of validated learning about customers with the least effort” (&lt;/em&gt;&lt;/font&gt;&lt;a href="https://leanstartup.co/what-is-an-mvp/"&gt;&lt;font&gt;https://leanstartup.co/what-is-an-mvp/&lt;/font&gt;&lt;/a&gt;&lt;font&gt;).&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font&gt;That definition is reasonable, but the reality is more complicated. “MVP” has become a largely unhelpful term. In this article, I will present two ways that it is unhelpful and two mechanisms for mitigating those concerns.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font&gt;A Lack of Shared Understanding&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font&gt;Shared understanding is one of the most valuable assets of a team, especially when moving quickly. It is inefficient and expensive if your team members are building too much or building the wrong things. The group may be well-aligned on the “&lt;em&gt;what”&lt;/em&gt; you are developing, but the ambiguity of the MVP term creeps in around the edges. You may find yourself answering questions like:&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font&gt;●&lt;font style="font-size: 9px;" face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/font&gt; &lt;font&gt;Do we need tests?&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font&gt;●&lt;font style="font-size: 9px;" face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/font&gt; &lt;font&gt;That feature needs to be complete, but what about these related features?&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font&gt;●&lt;font style="font-size: 9px;" face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/font&gt; &lt;font&gt;What sort of user load does this need to support?&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font&gt;●&lt;font style="font-size: 9px;" face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/font&gt; &lt;font&gt;How, where, and which users will be using this MVP?&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font&gt;●&lt;font style="font-size: 9px;" face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/font&gt; &lt;font&gt;Will this become production code? &lt;em&gt;Really?&lt;/em&gt; (How many teams have been burned by this one?)&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font&gt;I’ve seen the term MVP used as a stand-in for non-production work or as an excuse for bugs or poorly implemented features. This lack of shared understanding may not be a problem for the disciplined and experienced team, but I’ve repeatedly seen senior teams make poor assumptions.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font&gt;The Build Trap&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font&gt;The second concern with &lt;em&gt;MVP&lt;/em&gt; is the last word in the acronym - ‘product.’ Product implies a level of fidelity much higher than ‘experiment.’ The original definition and the Lean Startup book couch the MVP in terms of the scientific method. MVPs are experiments; they allow the team to test the output from a single cycle through the “Build, Measure, Learn” loop (read more about it here:&lt;/font&gt; &lt;a href="http://theleanstartup.com/principles"&gt;&lt;font&gt;http://theleanstartup.com/principles&lt;/font&gt;&lt;/a&gt;&lt;font&gt;).&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font&gt;Shipping a product can be uncomfortable work; I’ve seen many teams get bogged down in the details of their MVP; they are doing too much (or the wrong) work because, for many groups, building a product is less daunting than facing the customer.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font&gt;At Mile Two, we use a handful of terms alongside the stray MVP; experiment, design seed, prototype, mockups, etc. Our early “MVPs” for some projects were simple pen and paper or whiteboard exercises. Some relied on mockups designed in Adobe XD. When your business is developing software, you’re going to get some odd looks if you call your mockup drawn on a whiteboard your “MVP.” You’ll get fewer strange looks calling it a “Process Experiment.”&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font&gt;Words Matter&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font&gt;Fundamentally, my problem isn’t the term itself. It is a placeholder; shared understanding must support it to make it effective.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font&gt;Scales of Fidelity&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font&gt;At Mile Two, we’ve been experimenting with using “fidelity scales” to better understand and communicate the level of effort to be invested in any endeavor. The categories that we use are in flux but include:&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font&gt;●&lt;font style="font-size: 9px;" face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/font&gt; &lt;font&gt;Software Fidelity&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font&gt;●&lt;font style="font-size: 9px;" face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/font&gt; &lt;font&gt;Design Artifact Fidelity&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font&gt;●&lt;font style="font-size: 9px;" face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/font&gt; &lt;font&gt;Project Resilience&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font&gt;●&lt;font style="font-size: 9px;" face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/font&gt; &lt;font&gt;Progress Alignment to Plan&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font&gt;Our goal is to develop consensus around these levels so that every team (and team member) has a shared understanding of the work needed. An experiment that is (for example) a “3” on the software fidelity scale, regarding the level of testing, reliability, and roughly how long the team will work on the iteration.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font&gt;These metrics connect to the specific way that Mile Two works, but they are adaptable to the processes of other organizations.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font&gt;Embrace the Experiment&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font&gt;One of the easiest ways to frame the work is to walk through the three parts of the “Build, Measure, Learn” loop backward:&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font&gt;●&lt;font style="font-size: 9px;" face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/font&gt; &lt;font&gt;What one thing are you trying to learn?&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font&gt;●&lt;font style="font-size: 9px;" face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/font&gt; &lt;font&gt;What can you measure so that you will learn what you need?&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font&gt;●&lt;font style="font-size: 9px;" face="Times New Roman"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/font&gt; &lt;font&gt;What is the simplest thing you can build to measure what you need adequately?&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font&gt;This framing can help you break out of the “build trap” where you over-engineer or over-develop your experiments. The “Build, Measure, Learn loop” is meant to be an iterative process; if you try to learn too many disparate things from an experiment, you can end up learning nothing at all.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font&gt;At Mile Two, we believe strongly in iterative development and co-creating the solution with our customers. We bring them into the process early and often; we get feedback on small experiments that advance our (and sometimes, our customer’s) understanding of the problem domain as frequently as possible.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font&gt;I’m always happy to talk about product development processes or how Mile Two can help you solve your complex problems. Feel free to send me an email at dbest@miletwo.us.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10969759</link>
      <guid>https://www.technologyfirst.org/Tech-News/10969759</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Mon, 30 Aug 2021 18:44:51 GMT</pubDate>
      <title>Arrested Development</title>
      <description>&lt;p&gt;&lt;font face="Verdana" color="#DD4A3A" style="font-size: 18px;"&gt;Mardi Humphreys, Change Agent, Integration Edge&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Why am I, a marketing aficionado, writing about developers? Because their scarcity is about to halt the pace of innovation here in Dayton, Ohio. You know, the birthplace of aviation, the cash register, and the pop-top beverage can? This situation could hurt Dayton’s brand, and that’s where I come in.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;So here we are, fully vaccinated and (somewhat) back in the office, but wait…where is everybody? Where did all the developers go? If they aren’t all WFH, (and research suggests that if you want them to work for you, you should let them work from home, but more on that later…) then they are probably being wined and dined by potential employers like Google, IBM, and Apple because good developers are hard to find. They are few, far between, and in demand right now.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;In 2019, the average time it took to fill a tech position was 66 days compared to taking 43 days to fill non-tech positions. When COVID-19 sent everyone home in 2020, and multitudes of businesses moved to e-commerce, the demand for developers went up exponentially. Here at the end of Q3 2021, businesses continue to rethink their strategies thanks to the lessons learned from the digital transformation thrust upon them last year. Plus, evidence suggests that there is no going back to the way things were pre-pandemic. Competition for talent is intense. Simply put, there are more open positions than developers to fill them.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Why is there a shortage?&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;em&gt;&lt;font&gt;Every employer is now a tech employer:&lt;/font&gt;&lt;/em&gt; &lt;font&gt;retail, education, finance, healthcare, etc. Reading those industry categories, you can think of at least one name for each of them. Take retail for instance. Kroger not only offers a digital shopping experience, now they are testing&lt;/font&gt; &lt;a href="https://ir.kroger.com/CorporateProfile/press-releases/press-release/2021/Kroger-and-Drone-Express-Partner-to-Provide-Grocery-Delivery-by-Drone/default.aspx"&gt;&lt;font&gt;drone delivery&lt;/font&gt;&lt;/a&gt; &lt;font&gt;right in our backyards. Kroger has nearly half a million employees and plenty of them are developers since their digital business&lt;/font&gt; &lt;a href="https://fortune.com/company/kroger/fortune500/"&gt;&lt;font&gt;doubled&lt;/font&gt;&lt;/a&gt; &lt;font&gt;in 2020, and they plan to do $20 billion in online sales by 2023.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;em&gt;&lt;font&gt;Lack of skills:&lt;/font&gt;&lt;/em&gt;&lt;font&gt;The technology is evolving so fast (like Blockchain, Cybersecurity, and AI) and the necessary skills are so specialized (e.g., Chief Nursing Informatics Officer is a real job) that humans can neither learn fast enough, not get experience fast enough, nor interview fast enough to fill open positions.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;em&gt;&lt;font&gt;Lack of credentials:&lt;/font&gt;&lt;/em&gt;&lt;font&gt;Our colleges and universities are playing catchup in offering the languages and internships necessary to work with the emerging technologies, and employers are looking for those college and university names on resumes. To fill open positions, more employers and job seekers are turning to bootcamps as avenues to quickly upskill workforce.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;If you want to be a developer, what should you learn?&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;There are a few things you should be well versed in to stand out from the competition and attract a lucrative salary. Employers are looking for developers who are experts in Python; followed closely by JavaScript and Go. If you are looking for certification, CompTIA has paths that are widely accepted by employers and offered by local workforce development companies. Python is the most popular language to date and experience with machine learning is quick on its heels because you have to be able to make sense of all of that collected data. Being able to legitimately list Data Science on your resume is a plus. It’s a bit vague since it could mean anything from data analytics to software engineering, but if machine learning is on your resume, data science can be too. If you are not already certified in Amazon AWS, Microsoft Azure, and/or Google Cloud, get certified. Everything is moving that way. It behooves you to be ahead of the wave. If you want to specialize, then experience in Cybersecurity, AI code testing, or IoT (especially as consumers gain access to 5G) will put you in a good position to get the role you want. But please remember, you also need soft skills like emotional intelligence, flexibility, continuous learning, strategic thinking, and habitual process improvement to thrive in a team environment.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;If you employ developers, how do you keep and attract talent?&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;em&gt;&lt;font&gt;Be flexible:&amp;nbsp;&lt;/font&gt;&lt;/em&gt;&lt;font&gt;Remember earlier in this article when I said more on WFH later? Well, it’s later. Developers in the market for new positions are in the driver’s seat and plenty of them are driving home. Post-COVID-19, WFH is less of a perk and more of an assumption. Hey, if Microsoft &lt;a href="https://blogs.microsoft.com/blog/2020/10/09/embracing-a-flexible-workplace/"&gt;can do it&lt;/a&gt; , so can you; particularly as it pertains to where, when, and for how long an employee works for your company. Giving employees options for working in the office, at home, or a combination of both, will help you compete for top talent. And flexibility has a wonderful side effect. It helps you with your DEI goals. Offering remote work attracts mothers, diffuses location bias, and ensures accessibility for the physically challenged.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;em&gt;&lt;font&gt;Communicate:&lt;/font&gt;&lt;/em&gt; &lt;font&gt;Offer multiple communication channels to promote team bonding. Open a Slack channel for remote workers to discuss what Netflix shows they are currently bingeing as well as separate channels for teams to collaborate on their mutual projects. Smooth onboarding by assigning new hires an ambassador to help them navigate company culture, introduce them to colleagues, and answer questions. In your emails to the entire company, normalize asking for help and promote overcoming challenges together.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;em&gt;&lt;font&gt;Upskilling:&lt;/font&gt;&lt;/em&gt; &lt;font&gt;Make continuous education for employees an item in the company budget. It should be a perk of working for you. Partner with local higher learning institutions and talk about emerging technologies, what you think you’ll need, and how you’d like to get your pipeline from them. They want to supply you with future employees as well as upskill your current workforce, you want a skilled workforce, and the workforce wants to, well, work. It’s a win-win-win that keeps everyone in the Tech Community in business.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10969753</link>
      <guid>https://www.technologyfirst.org/Tech-News/10969753</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Mon, 30 Aug 2021 18:29:16 GMT</pubDate>
      <title>IT Leader Spotlight: Randy Hinders</title>
      <description>&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;font color="#DD4A3A" face="Verdana" style=""&gt;&lt;font color="#DD4A3A" face="Verdana" style=""&gt;Randy Hinders, IT Director, Mile Two&lt;/font&gt;&lt;/font&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;strong&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Randy%20Hinders%20Circle.png" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;strong&gt;What was your first job?&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Afternoon paper delivery route. This was great at teaching responsibilities and accountabilities. It’s a shame that these types of opportunities for teens are not as easily available today.&lt;/font&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;strong&gt;What’s the best career advice you ever received?&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;My dad told me as I joined the Army. Volunteer for everything. Sometimes you will get a crap job, and I did, and sometimes you will get an awesome assignment. Which I have. I raise my hand for those technical challenges that will push my understanding of a topic or business process so that I learn and grow. Sometimes they stink and might not be successful, other times they are wonderful experiences making lifelong friends in other areas of business that I would not have seen had I just stayed in my cube.&lt;/font&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;strong&gt;What advice would you give to aspiring IT leaders?&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;First, remember that it is about your team and not you. If your team is successful, only then will you be successful. Second, know and be yourself. Do not try to be someone you aren’t but do bring on people who can and will fill in your shortcomings.&lt;/font&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10969749</link>
      <guid>https://www.technologyfirst.org/Tech-News/10969749</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Mon, 30 Aug 2021 16:01:29 GMT</pubDate>
      <title>Get More from Your Professional Network</title>
      <description>&lt;p&gt;&lt;font color="#DD4A3A"&gt;Aaron Davis, Recless Tech&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;Your professional network holds the key to solve a work problem, sign a customer, or get that new job. A referral from a known person comes with more trust. It is engaged more quickly and creates a bias for the connection to be a success.&lt;/p&gt;

&lt;p&gt;I can no longer count how many times I’ve coached a technical professional through how to network with their contacts. Unfortunately, it’s often when someone is referred to me in an urgent job hunt situation - a contract ending, an unexpected termination, or work suddenly becomes unbearable. I always wish we had talked months prior.&lt;/p&gt;

&lt;p&gt;The best time to network is before it's needed!&lt;/p&gt;

&lt;h1&gt;Make a List&lt;/h1&gt;

&lt;p&gt;People get lost, and it’s hard to keep up with everyone that’s valuable to you. If your LinkedIn is too vast and messy (like mine), document who you want to keep up. Do they have a good reputation? Do you trust them? Do they respect you? Add them to your list. Salespeople and recruiters use CRM systems but staying in touch is valuable to all of us. There’s nothing wrong with having a list of valued connections and dating your last interaction with them so you don’t lose touch.&lt;/p&gt;

&lt;h1&gt;Find Ways to Give&lt;/h1&gt;

&lt;p&gt;The hardest part of any give-and-take relationship is finding ways to give. If you want your network to be ready to help when you need them, invest early. The people you need to stay connected with are not always the ones right in front of you. Old colleagues may not come to you first to solve a problem. You have to go out of your way to stay in touch.&lt;/p&gt;

&lt;p&gt;Everyone knows the value of connecting with influencers and decision makers. But people you can help are even more important. They will remember you, and many of them will be in positions to help you in the future. Giving generously is the master key to networking.&lt;/p&gt;

&lt;h1&gt;Connect through Curiosity&lt;/h1&gt;

&lt;p&gt;People won’t always remember the details of your last conversation with them. They will remember how they felt! Being heard is an important part of feeling good in any relationship but can be with a more introverted personality. Stay curious. Asking big questions like “How’s work?” or “How’s your family?” might be enough to get conversations going with some. Others are more to the point. You may have to probe to stay connected. It’s your network, so do the work of learning what’s important to them, and how you can help.&lt;/p&gt;

&lt;h1&gt;Ask Directly for Help&lt;/h1&gt;

&lt;p&gt;When the time comes, and it always does, be prepared to ask for help. People like to help their friends and colleagues. It’s satisfying to know you’re valuable. It scratches a life-purpose itch to improve someone else’s situation. And when you state it in a way that is clearly an ask for assistance, it gives your connection a chance to feel like your hero.&lt;/p&gt;

&lt;p&gt;Leave some room to decide exactly how they can help. If you communicate your goal, tell them what you’ve done to get there, and ask them how they can help, most people will want to come to your aid.&lt;/p&gt;

&lt;p&gt;I prefer:&lt;/p&gt;

&lt;p&gt;“I’d like to communicate directly with PersonA about XYZ. I don’t trust the portal. But I need help getting in touch with them. How could you help me?”&lt;/p&gt;

&lt;p&gt;Over:&lt;/p&gt;

&lt;p&gt;“Would you introduce me to PersonA with an email?”&lt;/p&gt;

&lt;p&gt;Adding a bit of problem solving to the ask can offer a feeling of appreciation for the idea on top of the connection.&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" color="#182A44"&gt;&lt;font style="font-size: 13px;"&gt;Aaron Davis is the founder and CEO of&lt;/font&gt; &lt;a href="https://reclesstech.com/employers/"&gt;&lt;font style="font-size: 13px;"&gt;Recless Tech&lt;/font&gt;&lt;/a&gt;&lt;font style="font-size: 13px;"&gt;, an external referral platform that uses peer-to-peer sourcing to fill tough technology positions. He has previously served as the COO for a software services firm, the Talent Acquisition Director for a large health plan, and an Account Executive for a large tech staffing firm. Aaron is a Senior Professional of Human Resources, a Certified Scrum Master and holds an MBA from Wright State University.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 13px;" face="Verdana" color="#182A44"&gt;Aarondavis@reclesstech.com&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 13px;" face="Verdana" color="#182A44"&gt;937.672.4598&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10972109</link>
      <guid>https://www.technologyfirst.org/Tech-News/10972109</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Thu, 26 Aug 2021 19:51:24 GMT</pubDate>
      <title>Tempting Talent - Talent Series Part 4</title>
      <description>&lt;p&gt;&lt;font face="Verdana" color="#DD4A3A"&gt;Mardi Humphreys, Change Agent, Integration Edge&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;Last week we discussed how to retain your current employees during the Talent Tsunami. But despite your best efforts, it’s likely that some of them will still jump ship (cue&amp;nbsp;&lt;a href="https://www.youtube.com/results?search_query=debbie+downer"&gt;Debbie Downer&lt;/a&gt;).&amp;nbsp;From a financial perspective, hiring a new employee is an expensive process. You not only have to calculate salary, but also the cost of recruiting, training, and benefits. If you are a company of 0-500 people, this price could average&amp;nbsp;&lt;a href="https://toggl.com/blog/cost-of-hiring-an-employee"&gt;$7645&lt;/a&gt;.&amp;nbsp;How can you ensure you’re attracting trustworthy talent?&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;strong&gt;Congruity Through Change&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;It’s tempting to just increase the top of the salary range or offer a sign-on bonus and publish the “We’re Hiring!” post. But throwing money at the problem is not a long-term solution. The pandemic proved the workplace can function very differently than it’s been allowed to since the industrial age. This excited employees, but management not so much. COVID-19 fast-tracked the inevitable evolution of the way knowledge work gets done. Protocol that made factories run efficiently (e.g., all employees work five consecutive eight-hour days) are no longer in employees nor companies best interests here at the end of the digital revolution. If you make this an arbitrary rule, you risk losing out on valuable talent. Conversely, if you explore innovative alternatives for running your business, then you keep your company’s vision intact by taking advantage of modern methods to manifest it. For example: How many processes can you&amp;nbsp;&lt;a href="https://digital.com/labor-shortage-forces-3-out-of-4-businesses-toward-automation-and-outsourcing/"&gt;automate&lt;/a&gt;?&amp;nbsp;Can you employ subcontractors? Can you upskill high-value individual contributors? Concepts like remote working and unlimited PTO that your company deemed impractical before COVID-19 are now your competitors’ widely advertised company perks. Ponder how implementing such changes may impact your business. A company that helps its workforce navigate work-life integration attracts employees who want to make that company thrive. Be a company that allows employees autonomy to get their projects done, advance in their career and life, and affiliate with both their coworkers and company. Prioritize being a great place to work; a place where employees are valued as human beings. When you do, that becomes part of your brand. In short order, you have an inspiring story to tell everyone and you will attract a workforce excited to invest in the company’s success.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;strong&gt;Not Your First Rodeo&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;You’ve been short-handed before, so now is not the time to panic. Employment is a long-term prospect. You need to discern whether a new hire will be a loyal member of your team or if they are just riding a Talent Tsunami wave. Be as selective in choosing whom to add to your staff now as you were pre-pandemic. When hiring, consider:&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;font face="Verdana"&gt;Why are they changing jobs?&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana"&gt;Did COVID-19 cause them to be laid off or furloughed?&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana"&gt;What did they learn during the pandemic that will help them succeed in this role?&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana"&gt;Are they looking for more purpose in their work?&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana"&gt;What specifically drew them to your company?&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana"&gt;Did someone you trust from your network connect you to this talent prospect?&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana"&gt;Do they seem excited to meet with you?&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana"&gt;Did they tailor their resume to the open position?&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana"&gt;Did they ask you good questions about both the company and the job?&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;This power shift to job seekers won’t last forever. You’ll likely have the same pre-pandemic issues (e.g., finding employees with specific skills) you always had, but if you refresh your policies to create more win-win working conditions, you’ll attract quality talent.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;What makes your organization attractive to talent?&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10959047</link>
      <guid>https://www.technologyfirst.org/Tech-News/10959047</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Wed, 18 Aug 2021 15:31:41 GMT</pubDate>
      <title>The Tide is High - Talent Series Part 3</title>
      <description>&lt;p&gt;&lt;font color="#DD4A3A"&gt;Mardi Humphreys, Change Agent, Integration Edge&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;You kept your business solvent during the pandemic. Now vaccines are available and buildings are reopening. Both you and your workforce are deciding where to go from here. Pivots like switching the product you manufacture (e.g., making&amp;nbsp;&lt;a href="https://parade.com/1011922/jerylbrunner/distilleries-making-hand-sanitizer/"&gt;&lt;font style="font-size: 20px;"&gt;hand sanitizer&lt;/font&gt;&lt;/a&gt;&amp;nbsp;instead of bourbon) or shifting your employees to working from home has not only burned everyone out, but also revealed work-life integration paradigm shifts. You need to both retain your current workforce and attract new employees, but how? This week, let’s focus on keeping the folks you have.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;font&gt;&lt;strong&gt;Pivot Again&lt;/strong&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;You regularly adapt your business to market conditions. This shift in the balance of power is a condition more abrupt than most, but it offers you a gift. It forces you to look at your mission, vision, values, policies, and procedures and sift them through the filter of&amp;nbsp;&lt;a href="https://mardihumphreys.com/more-precious-than-gold/"&gt;&lt;font style="font-size: 20px;"&gt;The Platinum Rule&lt;/font&gt;&lt;/a&gt;.&amp;nbsp;For example, employees hear the siren call of flexibility and autonomy in their jobs. Are your company’s paid time off policies amenable to employees with caregiving duties to young children, aging parents, chronically ill partners, etc.? If not, then it behooves you to reevaluate those policies. If your employees are being washed away by the&amp;nbsp;&lt;a href="https://hrcollaborative.com/2021/04/talent-tidal-surge/"&gt;&lt;font style="font-size: 20px;"&gt;Talent Tsunami&lt;/font&gt;&lt;/a&gt;,&amp;nbsp;then you need to take a long, hard look at your company’s culture, protocols, and development paths. If your workforce was happy before the pandemic, then they would not be so tempted to leave now. You will be wise to shift your mindset to focus more on taking care of your employees and repeatedly communicating that commitment. People want to work in an environment where they feel valued. If your company has a vision the workforce can believe in, you coach them to share it, and demonstrate how their jobs are integral to realizing it, then employees get invested in meeting the company’s goals and want to stick around.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;font face="Verdana"&gt;&lt;strong&gt;Engagement Brings Retention&lt;/strong&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;The inconvenient truth is it’s cheaper to keep an employee than to hire a new one. If you don’t know what your employees need to achieve work-life integration, or to feel appreciated, now is the time to ask and actively listen to their answers. Individual contributors who feel they belong and have purpose are less likely to burn out. How do you know if your employees are burned out? Ask them. Company-wide email surveys are easy to create, send, and compile results. You can ask questions like: How do you think the company handled pivoting during COVID-19? How many days a week do you want to WFH? If the company reimburses you for upskilling, will you agree to work for us for a year? The answers will give you data that will not only help you to assess the risk of employees leaving, but also reveal what you can do to keep the good ones.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;font face="Verdana"&gt;&lt;strong&gt;“Bye” the Way&lt;/strong&gt;&lt;/font&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;Unless employees signed a contract saying they’d do one, they are not obligated to give&amp;nbsp;&lt;a href="https://www.indeed.com/career-advice/career-development/are-exit-interviews-required"&gt;&lt;font style="font-size: 20px;"&gt;exit interviews&lt;/font&gt;&lt;/a&gt;. A smart employee will not grant one if they don’t have anything nice to say. An exit interview is more of a benefit to you than to them. It’s an exiting employee’s gift of feedback to you. If the resigning employee grants one, stick to questions that will help you retain other employees. For example: What could the company have done to make it easier for your team to communicate with each other?&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;What are you doing to encourage your employees to join you in making your business succeed?&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10939355</link>
      <guid>https://www.technologyfirst.org/Tech-News/10939355</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Wed, 18 Aug 2021 15:13:29 GMT</pubDate>
      <title>PMI - Summit 2021 - Accepting Proposals until Aug 27th</title>
      <description>&lt;P&gt;&lt;FONT face="Verdana" color="#DD4A3A"&gt;Project Management Institute - Dayton Miami Valley Ohio&lt;/FONT&gt;&lt;FONT color="#4F17A7" face="Verdana"&gt;&amp;nbsp;&amp;gt;&amp;gt;&amp;nbsp;&lt;/FONT&gt;&lt;SPAN&gt;&lt;FONT color="#4F17A7"&gt;Submit Your Proposal!&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;

&lt;P style="line-height: 23px;"&gt;&lt;FONT face="Verdana"&gt;Our goal is to curate outstanding content for our 2021 Virtual Summit. We are seeking engaging speakers for our 1-day Conference on October 29, 2021. If you are willing to share your expertise with our PM community, complete the speaker form below. The email address you provide in the form will be the main method of contact throughout this process.&lt;/FONT&gt;&lt;/P&gt;

&lt;P style="line-height: 23px;"&gt;&lt;FONT face="Verdana"&gt;With the focus on our theme "Change can be Scary", our ideal speaker is:&lt;/FONT&gt;&lt;/P&gt;

&lt;UL&gt;
  &lt;LI&gt;&lt;FONT face="Verdana"&gt;Experienced, engaging, and comfortable speaking in front of groups.&lt;/FONT&gt;&lt;/LI&gt;

  &lt;LI&gt;&lt;FONT face="Verdana"&gt;Passionate about sharing expertise on topics such as leadership, program/project management, business strategy, work-life balance, and change management.&lt;/FONT&gt;&lt;/LI&gt;

  &lt;LI&gt;&lt;FONT face="Verdana"&gt;Willing to partner with PMI’s Southwest Ohio and Dayton/Miami Valley Chapters to provide the best possible experience for our attendees.&lt;/FONT&gt;&lt;/LI&gt;

  &lt;LI&gt;&lt;FONT face="Verdana"&gt;Speakers should tell the story based on experience and be candid about outcomes, lessons learned, and techniques. Please “Think TED talk not Lecture Hall.”&lt;/FONT&gt;&lt;/LI&gt;
&lt;/UL&gt;

&lt;P style="line-height: 23px;"&gt;&lt;FONT face="Verdana"&gt;Please submit your information via the&amp;nbsp;&lt;A href="https://pmiswohio.org/index.php?option=com_rsform&amp;amp;view=rsform&amp;amp;formId=31" target="_blank"&gt;&lt;FONT&gt;speaker form&lt;/FONT&gt;&lt;/A&gt;&amp;nbsp;today!&lt;/FONT&gt;&lt;/P&gt;

&lt;P&gt;&lt;IMG src="https://www.technologyfirst.org/resources/Pictures/pmi_chp_logo_dayton_miami_valley_ohio_hrz_cmyk.jpg" border="0" width="438" height="203"&gt;&lt;BR&gt;&lt;/P&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10939314</link>
      <guid>https://www.technologyfirst.org/Tech-News/10939314</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Wed, 11 Aug 2021 17:12:01 GMT</pubDate>
      <title>Making Waves - Talent Series Part 2</title>
      <description>&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;" color="#DD4A3A"&gt;Mardi Humphreys, Change Agent, Integration Edge&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;The pandemic made us take a hard look at our priorities. What is now most important to you? In terms of your job, if you were able to pivot (e.g., a restaurant moving from fine-dining in person to at home delivery) or to transition to WFH (e.g., software developing), you’re grateful to have found a way to continue making a living. But now that we’ve moved into COVID-19’s phase of vaccines and variants, do you want to keep this up?&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;strong&gt;What Do You Want?&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;It’s time to decide what aspects of the working-under-quarantine conditions you want to maintain. Has the way you had to work made you want a different job, maybe even a different career path? If so, you have loads of company. The U.S. Bureau of Labor Statistics&amp;nbsp;&lt;a href="https://www.bls.gov/news.release/pdf/jolts.pdf" target="_blank"&gt;&lt;font&gt;reports&lt;/font&gt;&lt;/a&gt;&amp;nbsp;3.6 million Americans quit their jobs in May 2021. But before you start searching for a new situation, get clear on why you want to leave your current one. If you’re running away from this job instead of running to another one, your discontent is likely to follow you. Ask yourself:&lt;/font&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Am I burned out?&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Did the pandemic reveal a side of my company’s culture that I can’t support?&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Were my manager’s expectations unreasonable?&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Did I discover a remote position would be best for work-life integration?&amp;nbsp;&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;During the work day, when you feel frustrated or stressed, write down what you’re working on or what’s happening. Is it a project, person, and/or PTO? The answers will help you define your non-starters when considering your next role.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Defining what you don’t want narrows your choices down to what you do want. Compensation (salary, PTO, insurance, retirement benefits), location, culture, and leadership development are all obvious details you need to consider. But also ask yourself:&lt;/font&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;What does your perfect job look like?&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Where are you doing it?&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;When are you doing it?&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Who are you doing it with?&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Why are you doing it?&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;How are you doing it?&amp;nbsp;&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;What values do the answers to these questions reveal (e.g., freedom, culture, growth)? Rank them in order of importance. For one work week, notice what you are doing when you lose track of time as well as what you are doing when time seems to drag. Write these down and analyze them. While looking for a new position, search for one that allows you to do more of the work you enjoy.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;strong&gt;How Do You Get It?&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Once you figure out what you want, make a list of companies whose mission, vision, and values match yours. LinkedIn, Glassdoor, and Business Journals regularly identify great companies to work for. Target people in these companies you can reach out to for informational interviews. Notify your network that you are looking for a new role. Ask them not only for introductions to hiring managers you want to meet, but also ask how you can help connect them to the decision makers they want to meet. It’s tempting to apply for every job that looks like fun, thinking that eventually one will take, but that’s actually a time waster. It’s more effective to invest your time building relationships with your network. Insiders know a position is available before it gets publicly posted. A good rule of thumb is to network with five people for every one job application you submit.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Are you thinking about a new position? What are you looking for in a company?&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10925051</link>
      <guid>https://www.technologyfirst.org/Tech-News/10925051</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Tue, 03 Aug 2021 00:28:11 GMT</pubDate>
      <title>UPSKILL your workforce through TechCred &amp; Technology First Academy</title>
      <description>&lt;p align="center"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Sinclair%20TF%20Academy.PNG" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10790583</link>
      <guid>https://www.technologyfirst.org/Tech-News/10790583</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Mon, 02 Aug 2021 23:15:55 GMT</pubDate>
      <title>Should You Surf the Tsunami? - Talent Series Part 1</title>
      <description>&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;" color="#DD4A3A"&gt;Mardi Humphreys, Change Agent, Integration Edge&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;The number of posts from my LinkedIn connections announcing their new positions increases every day. Have you noticed it too? The&amp;nbsp;&lt;a href="https://hrcollaborative.com/2021/04/talent-tidal-surge/" target="_blank"&gt;&lt;font&gt;Talent Tsunami&lt;/font&gt;&lt;/a&gt;&amp;nbsp;is soaking us. Is it tempting you to find a new gig? Even now a job search can still be long, arduous, and uncertain. How can you tell when it’s time to move on?&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;In my role as a&amp;nbsp;&lt;a href="https://www.theintegrationedge.com/" target="_blank"&gt;&lt;font&gt;Change Agent&lt;/font&gt;&lt;/a&gt;,&amp;nbsp;I ask questions so my clients can visualize both where they are and where they want to be. Next week, we’ll discuss how to figure out where you want to be. But first,&amp;nbsp;here are questions to help you determine whether or not your current employment situation is still worth your&amp;nbsp;&lt;a href="https://mardihumphreys.com/is-it-worth-your-t-e-a-m/" target="_blank"&gt;&lt;font&gt;T.E.A.M.&lt;/font&gt;&lt;/a&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;strong&gt;Your Body&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Stress can physically manifest itself. Do you have headaches, nausea, and/or heart palpitations when you’re getting ready for work, at work, or just thinking about work? If so, your subconscious is trying to get your attention.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;strong&gt;Your Mind&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;If your talents aren’t being tapped, you’ll get frustrated and, eventually, resentful.&lt;/font&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Do your skills match the work you’re doing?&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Are you unhappy the majority of the time you’re working?&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Are you spending more time on social media than your work?&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Are you watching the clock hoping time will speed up so you can leave?&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Do you experience&amp;nbsp;&lt;a href="https://www.washingtonpost.com/lifestyle/wellness/what-are-sunday-scaries/2021/07/20/c866ff2c-e991-11eb-97a0-a09d10181e36_story.html" target="_blank"&gt;Sunday Scaries?&lt;/a&gt;&amp;nbsp;&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Are you looking at job postings and daydreaming about them?&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Are you no longer proud of the work you’re doing?&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Are you lowering your standards?&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Do you hear yourself say, “It’s just a job?"&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Have you lost your passion for the work?&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Do you see your work as challenges or problems?&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Careless mistakes (e.g., frequent typos, forgetting scheduled meetings) happen, but too many too often indicates that you’re disengaged from the work. Are you making too many glaring errors?&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;strong&gt;Your Environment&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;You can try to influence your environment, but the only actions you can control are your own.&lt;/font&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Is the environment toxic?&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Is the culture (e.g., you want to WFH and the company insists you spend the entire week at the office) not a good fit for you?&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Is the company restructuring?&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Are there rumors of outsourcing your department or selling the company?&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Are you chronically understaffed?&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;strong&gt;Your Development&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Has the novelty of being the SME worn off?&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Are you tired of being the trainer and never the one learning something new?&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Does your employer provide company time and money for upskilling?&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Is advancement possible?&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;In order for you to move up, does someone have to leave?&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Can you have a transparent conversation with your manager to find out if what you’re looking for can be attained within the company?&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Have you taken on more responsibility and the effort has yet to be acknowledged?&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Have you&amp;nbsp;&lt;a href="https://mardihumphreys.com/youre-asking-for-it/" target="_blank"&gt;asked&lt;/a&gt;&amp;nbsp;for a promotion at multiple performance reviews and even after completing the tasks your manager told you would result in advancement, they tell you that you’re still not qualified yet?&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Are you no longer getting highly visible assignments?&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;strong&gt;Your Relationships&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;How do you get along with your manager?&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Does your manager habitually give you instructions and refuse to hear your insight?&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Does your manager refuse to negotiate benefits or discuss salary?&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Are conversations with friends and family dominated by complaints about your job?&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;When you evaluate whether or not your current employment is worth your T.E.A.M., what criteria do you use?&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10790449</link>
      <guid>https://www.technologyfirst.org/Tech-News/10790449</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Thu, 29 Jul 2021 18:17:38 GMT</pubDate>
      <title>Wright State offers "quick" way to add credentials</title>
      <description>&lt;p&gt;Graduate Certificates: &lt;strong&gt;&lt;em&gt;Big and Smart Data&lt;/em&gt;&lt;/strong&gt; and &lt;strong&gt;&lt;em&gt;Cyber Security Analytics&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#026937"&gt;&lt;strong&gt;&lt;u&gt;Big and Smart Data Graduate Certificate&lt;/u&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;&lt;font color="#026937"&gt;Why Choose Big and Smart Data Sciences?&lt;/font&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style="line-height: 20px;"&gt;The Department of Computer Science and Engineering offers a program of graduate study leading to the Education Certificate in Big and Smart Data Sciences. This unique certificate will equip business professionals with the technical foundation needed to manage and analyze Big Data and to create Smart Data-enabled applications for enterprises and individuals.&lt;/p&gt;

&lt;p style="line-height: 20px;"&gt;There is an unprecedented growth in data collected by all types of organizations for scientific, medical, financial, and other purposes. This comes as a result of activities in our interconnected world including social activities on the web. It is produced using sensors and other high throughput devices on or around individuals and around the globe. This has given rise to Big Data, characterized by five Vs (volume, velocity, variety, veracity, and value). Big and Smart Data Sciences is about the intelligent processing of Big Data for improved insights and decision-making for enterprises and individuals. It is also about creative approaches, methodologies, and techniques that span data acquisition to analysis and applications.&lt;/p&gt;

&lt;p style="line-height: 20px;"&gt;&lt;a href="https://engineering-computer-science.wright.edu/computer-science-and-engineering/big-and-smart-data-graduate-certificate" target="_blank"&gt;More info here&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#026937"&gt;&lt;strong&gt;&lt;u&gt;Cyber Security Analytics Graduate Certificate&lt;/u&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;&lt;font color="#026937" style=""&gt;Why Choose Cybersecurity Analytics?&lt;/font&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style="line-height: 20px;"&gt;The Certificate in Cybersecurity Analytics contains the four core courses of our Master of Science in Cybersecurity degree. We offer a flexible learning environment with both online and in class courses. You can use this certificate to enhance your current skills or start on the journey to a master’s degree in cybersecurity. We will provide you with the technical foundation needed to understand the major risks associated with cyberspace, and how to begin mitigating those risks.&lt;/p&gt;

&lt;p style="line-height: 20px;"&gt;Complete this certificate online or on campus.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://engineering-computer-science.wright.edu/computer-science-and-engineering/cyber-security-analytics-graduate-certificate" target="_blank"&gt;More info here&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/logo_wsu.gif" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10782574</link>
      <guid>https://www.technologyfirst.org/Tech-News/10782574</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Thu, 29 Jul 2021 17:34:21 GMT</pubDate>
      <title>Cincinnati State: Online degree highlight!</title>
      <description>&lt;p&gt;&lt;font color="#000000" face="Verdana"&gt;&lt;strong&gt;&lt;a href="https://www.cincinnatistate.edu/academics/degree-certificate/computer-programming-and-database-management-computer-software-development-major-csd/" target="_blank"&gt;Computer Programming and Database Management – Computer Software Development Major (CSD)&lt;/a&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#555555" face="Verdana" style="font-size: 18px;"&gt;The Computer Programming and Database Management – Computer Software Development Major (CSD) is an online degree focuses on the design, development, implementation, and maintenance of software used in a variety of industries. Students gain knowledge of computer operating systems and software development using several programming languages.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#555555" face="Verdana" style="font-size: 18px;"&gt;Graduates earn an Associate of Applied Science degree and are prepared to enter the workforce as skilled computer programmers and systems integrators. Graduates may continue their education in a bachelor’s degree program in computer science, information systems, business informatics, or business administration.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#555555" face="Verdana" style="font-size: 18px;"&gt;The Computer Software Development Major is primarily offered as an online degree for students who seek that instructional method. Some of the required courses can be taken through in-person classes.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#555555" face="Verdana" style="font-size: 18px;"&gt;Curious about software engineering?&amp;nbsp;&lt;/font&gt;&lt;a href="https://www.technologyfirst.org/resources/Documents/Cincy%20state%20-%20Computer%20Programming%20and%20Database%20Management%20-%20Software%20Engineering%20Technology%20Major%20(SET).pdf" target="_blank"&gt;&lt;font face="Verdana"&gt;Learn more about&lt;/font&gt; &lt;span style=""&gt;Computer Programming and Database Management - Software Engineering Technology Major (SET) right here&lt;/span&gt;&lt;/a&gt;&lt;span style=""&gt;.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/CincyStateWeb.png" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10782485</link>
      <guid>https://www.technologyfirst.org/Tech-News/10782485</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Fri, 23 Jul 2021 17:58:39 GMT</pubDate>
      <title>Time to recruit! University of Dayton Career Fairs this September!</title>
      <description>&lt;p&gt;&lt;font color="#000000" face="Verdana"&gt;As the fall 2021 semester is quickly approaching, UD Career Services is pleased to share upcoming fall recruiting events. Information about each event and a link to register are listed below.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#000000" face="Verdana"&gt;Fall 2021 Career and Internship Fair *In-Person*&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;&lt;font color="#000000" face="Verdana"&gt;September 13 from 1-5 PM at UD RecPlex&lt;/font&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;font color="#000000"&gt;Organizations are invited to visit our campus and meet with students and alumni from ALL MAJORS and degree levels seeking employment in internships/co-ops and full-time opportunities. Registration is available through&amp;nbsp;&lt;/font&gt;&lt;a href="https://app.joinhandshake.com/career_fairs/26357/employer_preview?token=TCL58tWSq4M_oHoWjR7fWrP_m9ZTo0inQJ6YDDL8l16K6Ni2vca_cg"&gt;&lt;font&gt;Handshake&lt;/font&gt;&lt;/a&gt;&lt;font color="#000000"&gt;.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#000000" face="Verdana"&gt;Fall 2021 Virtual Fairs&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;&lt;font color="#000000" face="Verdana"&gt;September 15 &amp;amp; 16 from 2-5 PM on Handshake&lt;/font&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;a href="https://app.joinhandshake.com/career_fairs/25695/employer_preview?token=27a9DWPutxfEuFW9FyjEvEGehApyUfbWHQFh2RKb0drK_Y49tBITuw"&gt;&lt;font&gt;September 15&lt;/font&gt;&lt;/a&gt;&lt;font color="#000000"&gt;&amp;nbsp;– Science, Technology Engineering, Mathematics (STEM) and Healthcare&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;a href="https://app.joinhandshake.com/career_fairs/25693/employer_preview?token=3f6uqyusNNh6lnrKFYB9HDrz0GThmfzStpUR3bldrxcxygc1vahcXg"&gt;&lt;font&gt;September 16&lt;/font&gt;&lt;/a&gt;&lt;font color="#000000"&gt;&amp;nbsp;– Communication, Creative, Business, Human, and Public Services&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Verdana"&gt;The fairs are based on industry groups,&amp;nbsp;&lt;u&gt;not&lt;/u&gt;&amp;nbsp;student majors. Registration for both fairs are available on Handshake.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;font color="#000000"&gt;Contact&amp;nbsp;&lt;/font&gt;&lt;a href="mailto:employerrelations@udayton.edu"&gt;&lt;font&gt;employerrelations@udayton.edu&lt;/font&gt;&lt;/a&gt;&lt;font color="#000000"&gt;&amp;nbsp;with any questions.&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/Udayton_2019.png" alt="" title="" border="0" width="132" height="145"&gt;&lt;/font&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10782531</link>
      <guid>https://www.technologyfirst.org/Tech-News/10782531</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Wed, 21 Jul 2021 18:01:44 GMT</pubDate>
      <title>Host a Senior Capstone Project from UD!</title>
      <description>&lt;p&gt;&lt;font style="font-size: 16px;"&gt;The University of Dayton Department of MIS and Operations Management is now accepting Company Project Proposals for their MIS and OPS Senior Capstone Projects.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;These year-long projects (2021-2022 school year) allow students to learn by applying the theories they learn in the classroom to real world projects&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;Firms benefit by having a fresh set of eyes and ears focused to carry out proposed improvements.&amp;nbsp; In these projects, both assigned faculty and sponsor management guide the assigned student teams.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;There is no cost to companies sponsoring projects.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;Submitted project proposals should be submitted by August 16th.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 16px;"&gt;UD MIS/OPS 2021-2022 Senior Capstone Project Proposal&lt;/font&gt;&lt;/strong&gt;&lt;font style="font-size: 16px;"&gt;:&amp;nbsp;&lt;/font&gt;&lt;a href="https://drive.google.com/file/d/1gTIzgc2oMGty1l352Y6a6UWeHVEU4gnK/view?usp=sharing"&gt;&lt;font style="font-size: 16px;"&gt;https://drive.google.com/file/d/1gTIzgc2oMGty1l352Y6a6UWeHVEU4gnK/view?usp=sharing&lt;/font&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;"&gt;Any questions can be directed to : Stephen Hall, Director, Center for Project Excellence,&lt;/font&gt; &lt;a href="mailto:shall2@udayton.edu"&gt;&lt;font style="font-size: 16px;"&gt;shall2@udayton.edu&lt;/font&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10782533</link>
      <guid>https://www.technologyfirst.org/Tech-News/10782533</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Wed, 21 Jul 2021 17:49:05 GMT</pubDate>
      <title>Franklin University offers Microcredential Programs!</title>
      <description>&lt;P&gt;&lt;FONT color="#000000"&gt;Franklin University is excited to share our newest Industry-Endorsed Microcredential programs. You can gain professional training for in-demand skills with just three, six-week courses! Choose from:&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;

&lt;UL&gt;
  &lt;LI&gt;&lt;FONT color="#000000"&gt;Asana Project Management with Agile&amp;nbsp;&lt;/FONT&gt;&lt;/LI&gt;

  &lt;LI&gt;&lt;FONT color="#000000"&gt;Facebook Digital Marketing&amp;nbsp;&lt;/FONT&gt;&lt;/LI&gt;

  &lt;LI&gt;&lt;FONT color="#000000"&gt;Salesforce Administrator&amp;nbsp;&lt;/FONT&gt;&lt;/LI&gt;

  &lt;LI&gt;&lt;FONT color="#000000"&gt;Tableau Data Analytics&amp;nbsp;&lt;/FONT&gt;&lt;/LI&gt;
&lt;/UL&gt;

&lt;P&gt;&lt;FONT color="#000000"&gt;Fall term begins August 16&lt;SUP&gt;th&lt;/SUP&gt;! Learn more at:&lt;/FONT&gt; &lt;A href="http://www.franklin.edu/microcredentials"&gt;www.franklin.edu/microcredentials&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;&lt;IMG src="https://www.technologyfirst.org/resources/Pictures/Blog/Franklin%20Univ%20Logo.jpg" border="0" width="486" height="101"&gt;&lt;BR&gt;&lt;/P&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10782517</link>
      <guid>https://www.technologyfirst.org/Tech-News/10782517</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Mon, 19 Jul 2021 20:25:51 GMT</pubDate>
      <title>Discover the world of Cybersecurity! Community College Cyber Summit - Career Exploration</title>
      <description>&lt;div align="center"&gt;
  &lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/Sinclair%203CS%20smaller.PNG" alt="" title="" border="0" width="550" height="250"&gt;

  &lt;p align="left"&gt;&lt;strong&gt;&lt;font color="#92278F"&gt;OPENING CYBERSECURITY OPPORTUNITIES&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

  &lt;p align="left"&gt;&lt;span&gt;&lt;font style=""&gt;Cybersecurity careers and jobs keep growing and expanding. Community College Cyber Summit (3CS) is hosting a Career Exploration event to help you understand the field and learn about many and varied career opportunities. Cybersecurity 2- and 4-year students and recent graduates are invited to participate. You will have an opportunity to talk to professionals in the field about careers and jobs, and attend conference sessions specifically geared towards students to learn about advancements in the field. 3CS will be held November 5-7, 2021.&lt;/font&gt;&lt;/span&gt;&lt;/p&gt;

  &lt;p align="left"&gt;&lt;strong&gt;&lt;font color="#92278F"&gt;WHO WILL BE THERE?&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

  &lt;p align="left"&gt;&lt;font style=""&gt;&lt;font style=""&gt;Regional and national companies, government agencies and universities will share their opportunities for careers, advancement, and jobs with attendees. Additionally, over 400 college faculty and workforce development professionals from across the nation will be present.&lt;/font&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

  &lt;p align="left"&gt;&lt;strong&gt;&lt;font color="#92278F"&gt;WHY SHOULD YOU ATTEND?&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

  &lt;ul&gt;
    &lt;li&gt;
      &lt;div align="left"&gt;
        &lt;font style=""&gt;Discover a variety of cybersecurity careers and job opportunities&lt;/font&gt;
      &lt;/div&gt;
    &lt;/li&gt;

    &lt;li&gt;
      &lt;div align="left"&gt;
        &lt;font style=""&gt;Learn about the developments in the field by attending 3CS sessions&lt;/font&gt;
      &lt;/div&gt;
    &lt;/li&gt;

    &lt;li&gt;
      &lt;div align="left"&gt;
        &lt;font style=""&gt;Meet cybersecurity professionals to discuss skills and opportunities&lt;/font&gt;
      &lt;/div&gt;
    &lt;/li&gt;

    &lt;li&gt;
      &lt;div align="left"&gt;
        &lt;font style=""&gt;Meet peers and faculty to learn about different education programs&lt;/font&gt;
      &lt;/div&gt;
    &lt;/li&gt;
  &lt;/ul&gt;

  &lt;p align="left"&gt;&lt;strong&gt;&lt;font color="#92278F"&gt;FINANCIAL SUPPORT AVAILABLE&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

  &lt;ul&gt;
    &lt;li&gt;
      &lt;div align="left"&gt;
        &lt;span&gt;&lt;font style=""&gt;&lt;strong&gt;Local Student:&lt;/strong&gt; If you live within a 50 mile radius from the college you are entitled to a $75 stipend to cover the registration ($25) and incidentals.&lt;/font&gt;&lt;/span&gt;
      &lt;/div&gt;
    &lt;/li&gt;

    &lt;li&gt;
      &lt;div align="left"&gt;
        &lt;strong&gt;Regional Student:&lt;/strong&gt;&lt;span&gt;&amp;nbsp;If you live within a 100 mile radius from the college you are entitled to a $250 stipend for travel, lodging, registration ($25) and incidentals.&lt;/span&gt;
      &lt;/div&gt;
    &lt;/li&gt;

    &lt;li&gt;
      &lt;div align="left"&gt;
        &lt;span&gt;&lt;strong&gt;National Student:&lt;/strong&gt; If you live over 100 miles from the college you are entitled to a $500 stipend for travel, lodging, registration ($25) and incidentals&lt;/span&gt;
      &lt;/div&gt;
    &lt;/li&gt;
  &lt;/ul&gt;

  &lt;p align="left"&gt;&lt;strong&gt;&lt;font color="#92278F"&gt;HOW DO YOU APPLY?&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

  &lt;ul&gt;
    &lt;li&gt;
      &lt;div align="left"&gt;
        &lt;font&gt;You are required to complete the application form found at https://form.jotform.com/81047053504145&lt;/font&gt;
      &lt;/div&gt;
    &lt;/li&gt;

    &lt;li&gt;
      &lt;div align="left"&gt;
        &lt;font&gt;Once approved, you are required to register for 3CS. The registration enables you to attend the Career Exploration event, the 3CS sessions, and the conference social events&lt;/font&gt;
      &lt;/div&gt;
    &lt;/li&gt;

    &lt;li&gt;
      &lt;div align="left"&gt;
        &lt;font&gt;You will need to spend your own funds and will be reimbursed AFTER the conference upon completion of the 3CS Stipend Form.&lt;/font&gt;
      &lt;/div&gt;
    &lt;/li&gt;
  &lt;/ul&gt;

  &lt;p align="left"&gt;&lt;strong&gt;&lt;font color="#92278F"&gt;For more information about the Community College Cyber Summit (3CS), visit my3cs.org&amp;nbsp;&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10780598</link>
      <guid>https://www.technologyfirst.org/Tech-News/10780598</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Mon, 19 Jul 2021 18:03:39 GMT</pubDate>
      <title>Hire from Wright State - full-time and internships!</title>
      <description>&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Are you seeking recent graduates or alumni? Interested in building a co-op/internship program with Wright State University? Simply forward your job/internship postings to&amp;nbsp;&lt;a href="mailto:sheryl.kent@wright.edu" target="_blank"&gt;sheryl.kent@wright.edu&lt;/a&gt;.&amp;nbsp;&lt;/font&gt;&lt;span style=""&gt;In return, Sheryl will send a targeted e-mail blast out to Wright State University students and faculty as well as include your postings in Wright State's CECS LinkedIn Group:&lt;/span&gt; &lt;a href="https://www.linkedin.com/groups/961807" target="_blank"&gt;https://www.linkedin.com/groups/961807&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;You are also encouraged to post your positions to&amp;nbsp;&lt;a href="https://app.joinhandshake.com/login" target="_blank"&gt;&lt;font color="#954F72"&gt;Handshake&lt;/font&gt;&lt;/a&gt;- WSU's resume referral database. &amp;nbsp;This system will allow you to post your position, view potential candidates, and register for career related events. Any questions regarding this system should be directed to Career Services, 937-775-2556.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;font&gt;For a complete list of our majors in the College of Engineering and Computer Science, please visit:&amp;nbsp;&lt;/font&gt;&lt;a href="https://engineering-computer-science.wright.edu/degrees-and-certificates" target="_blank"&gt;&lt;font color="#954F72"&gt;https://engineering-computer-science.wright.edu/degrees-and-certificates&lt;/font&gt;&lt;/a&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#118040" face="Verdana" style="font-size: 18px;"&gt;STEPS TO SUCCESSFUL RECRUITING IN A VIRTUAL ENVIRONMENT&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;div style="margin-left: 2em"&gt;
  &lt;ul&gt;
    &lt;li&gt;&lt;font color="#191C1F" face="Verdana" style="font-size: 18px;"&gt;&lt;span style="background-color: white;"&gt;&lt;font&gt;Update your&amp;nbsp;&lt;strong&gt;Company Profile&lt;/strong&gt;&amp;nbsp;on Handshake (WSU’s online job board and resume referral system) to ensure students get a great impression of your brand. Upload your current logo, describe your company&amp;nbsp;culture, provide key statistics, post jobs and host events to impress students.&lt;/font&gt;&lt;/span&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;em&gt;&lt;span style="background-color: white;"&gt;&lt;font&gt;Refresh your company profile now by logging in&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/em&gt;&lt;a href="http://www.wright.edu/student-success/career-services/handshake-login-guide" target="_blank"&gt;&lt;em&gt;&lt;span style="background-color: white;"&gt;&lt;font color="#0B61FF"&gt;here&lt;/font&gt;&lt;/span&gt;&lt;/em&gt;&lt;/a&gt;&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;div style="margin-left: 2em"&gt;
  &lt;ul&gt;
    &lt;li&gt;&lt;span style="background-color: white;"&gt;&lt;font color="#191C1F" face="Verdana" style="font-size: 18px;"&gt;Create a&amp;nbsp;&lt;strong&gt;Virtual Recruiting Event&amp;nbsp;&lt;/strong&gt;on Handshake to spotlight your organization and to connect with students from targeted majors.&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;div style="margin-left: 2em"&gt;
  &lt;ul&gt;
    &lt;li&gt;&lt;font color="#191C1F"&gt;&lt;span style="background-color: white;"&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Request a&amp;nbsp;&lt;strong&gt;Virtual Information Session&lt;/strong&gt;&amp;nbsp;(Career Talks, Coffee Chat, Job Search Presentations, etc.)&amp;nbsp;to provide an interactive and engaging virtual presentation.&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;div style="margin-left: 2em"&gt;
  &lt;ul&gt;
    &lt;li&gt;&lt;font color="#191C1F"&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Participate in&amp;nbsp;&lt;strong&gt;Manufacturing Day&lt;/strong&gt;&amp;nbsp;(Founded by NAM, first Friday in October) and&amp;nbsp;&lt;strong&gt;Engineering Week&lt;/strong&gt;&amp;nbsp;(Founded by NSPE, Mid-February)&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;div style="margin-left: 2em"&gt;
  &lt;ul&gt;
    &lt;li&gt;&lt;font color="#191C1F"&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Other ways to build your brand:&lt;span style="background-color: white;"&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;&lt;span style="background-color: white;"&gt;Virtual Resume Critiques, Virtual Mock Interviews, Virtual Guest Speaker for Student Clubs/Organizations&lt;/span&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;strong&gt;&lt;span style="background-color: white;"&gt;&lt;font color="#191C1F"&gt;QUESTIONS?&lt;/font&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span style="background-color: white;"&gt;&lt;font color="#191C1F"&gt;&amp;nbsp;&lt;strong&gt;Seeking customized assistance?&lt;/strong&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;The Brandeberry Career Development Center offers a variety of opportunities to&amp;nbsp;&lt;/font&gt;&lt;font face="Verdana"&gt;volunteer on campus to increase your company's visibility within the College of Engineering and Computer Science. &amp;nbsp;&lt;span style="background-color: white;"&gt;&lt;font color="#191C1F"&gt;Please contact&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;span style=""&gt;me for more information. Simply email sheryl.kent@wright.edu or call 937-775-4491.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;We look forward building your brand on campus.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/logo_wsu.gif" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10782537</link>
      <guid>https://www.technologyfirst.org/Tech-News/10782537</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Mon, 19 Jul 2021 17:55:12 GMT</pubDate>
      <title>Hire an intern and let SOCHEintern handle the paperwork!</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/SOCHEintern-long.jpg" alt="" title="" border="0" width="588" height="139"&gt;&lt;br&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;font color="#000000"&gt;Ohio students are always searching for internship opportunities. SOCHEintern handles recruitment, applications, employee taxes, onboarding, orientation, hiring and payroll and customizes your internship program according to your unique business needs. Work with SOCHEintern to take full advantage of the energy and fresh ideas interns bring while reducing your hiring and training costs.&amp;nbsp;&lt;/font&gt;&lt;a href="http://r20.rs6.net/tn.jsp?f=0011RZvmlqG0QOQvBHdBzuszjvxZeG7ydv5MpAqJSYbJ9nL8kL0a_FX5dJaH9zMHJ2NEb2ctjchOi9peQtobAQhCsJwZMlEBzWo3rxeqMeUJT6lfSBVN6K0fQYmHO2AYMxXLuNxEk9MhdE=&amp;amp;c=PXZZ1a9aCbe0P0qCyaTJCgkk7LIoECPqaUjPK9qRvDGXGiyE8KPj9Q==&amp;amp;ch=_MrQIeY6ILTB721NvEhWnjZ23E3VS4wF8dZss5opMBngtlpKW6SulA==" target="_blank"&gt;&lt;font color="#1155CC"&gt;Click here&lt;/font&gt;&lt;/a&gt;&lt;font color="#000000"&gt;, email us at&amp;nbsp;&lt;/font&gt;&lt;a href="mailto:soche@soche.org" target="_blank"&gt;&lt;font color="#1155CC"&gt;soche@soche.org&lt;/font&gt;&lt;/a&gt; &lt;font color="#000000"&gt;or call&lt;/font&gt; &lt;a target="_blank"&gt;&lt;font color="#000000"&gt;(937) 258-8890&lt;/font&gt;&lt;/a&gt;&lt;font color="#000000"&gt;&amp;nbsp;to find your interns.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10782527</link>
      <guid>https://www.technologyfirst.org/Tech-News/10782527</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Mon, 19 Jul 2021 17:40:20 GMT</pubDate>
      <title>Register now for Launch Dayton Startup Week</title>
      <description>&lt;p align="left"&gt;&lt;em&gt;&lt;font style="font-size: 18px;"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/startup%20week.jpg" alt="" title="" border="0" width="572" height="80"&gt;&lt;br&gt;&lt;/font&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p align="left"&gt;&lt;em&gt;&lt;font style="font-size: 18px;"&gt;Tickets available for Dayton’s premier entrepreneurship conference&lt;/font&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Registration is live for Launch Dayton Startup Week, the Dayton region &lt;font face="Arial Unicode MS, serif"&gt;’&lt;/font&gt;s premiere opportunity for entrepreneurs to connect and network with both resource providers and fellow founders.&lt;/p&gt;

&lt;p&gt;This free, annual, week-long, community-focused conference brings together the region &lt;font face="Arial Unicode MS, serif"&gt;’&lt;/font&gt;s thinkers, dreamers, doers, makers, entrepreneurs and small business owners.&lt;/p&gt;

&lt;p&gt;“Speakers and workshops have been curated to celebrate the diversity of our startup community and to spur tangible progress for local businesses,” said Launch Dayton Startup Week organizer Audrey Ingram. “At Launch Dayton, we believe everyone should have the opportunity to determine their own economic prosperity. We hope Startup Week serves as a launching point for these young companies that will drive the economic future of the region.”&lt;/p&gt;

&lt;p&gt;All experiences are welcome — whether a seasoned entrepreneur or new to the community, there is space to jump in. Register here: &lt;a href="https://bit.ly/LaunchDaytonStartupWeek2021" target="_blank"&gt;&lt;font color="#000000"&gt;&lt;font color="#000000"&gt;https://bit.ly/LaunchDaytonStartupWeek2021&lt;/font&gt;&lt;/font&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This year’s conference is made possible thanks to generous support from title sponsors &lt;a href="https://www.canaryactuary.com/" target="_blank"&gt;Canary Consulting&lt;/a&gt;, &lt;a href="https://parallaxresearch.org/" target="_blank"&gt;Parallax Advanced Research&lt;/a&gt; and the &lt;a href="https://tecdayton.com/" target="_blank"&gt;Entrepreneurs’ Center&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&amp;nbsp;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/logo1.png" alt="" title="" border="0" width="190" height="67"&gt;&amp;nbsp;&amp;nbsp;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/logo3.png" alt="" title="" border="0" width="179" height="94"&gt;&amp;nbsp;&amp;nbsp;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/logo2.png" alt="" title="" border="0" width="193" height="50"&gt;&lt;br&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 19px;"&gt;Who:&lt;/font&gt;&lt;/strong&gt; Dayton’s startup founders, entrepreneurs, innovators, small business owners, business leaders, entrepreneurial resource providers, business-building experts, and more&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 19px;"&gt;What:&lt;/font&gt;&lt;/strong&gt; Launch Dayton Startup Week, the Dayton region’s premier entrepreneurship conference&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 19px;"&gt;When&lt;/font&gt;:&lt;/strong&gt; Sept. 13-16, 2021&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 19px;"&gt;Where&lt;/font&gt;:&lt;/strong&gt; All of this year’s sessions will be held in the historic Dayton Arcade complex, from the main stage, startup market and pitch competition in the Rotunda, to business workshops in The Hub, to industry-specific tracks in the The Tank and an artists + creative entrepreneurs track in The Contemporary’s gallery space. (We'll also be live-streaming sessions for those who prefer to attend virtually.)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 19px;"&gt;Why:&lt;/font&gt;&lt;/strong&gt; to celebrate the diversity of Dayton ’s entrepreneur community and to spur tangible growth for local businesses&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 19px;"&gt;Be Inspired:&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Monday, Sept. 13&lt;/em&gt;&lt;/strong&gt; we'll kick off at 8:30a with inspirational stories and how-to talks from founders offering advice that applies across industry lines, all told from our main stage in the historic Rotunda. Shop local businesses throughout the day at the Launch Dayton Startup Week Startup Market, hosted in partnership with Tae Winston, founder of the The Entrepreneurs' Marketplace, Shoppe &amp;amp; Connection.&lt;/p&gt;

&lt;p&gt;Stick around after the final keynote for a social hour, followed by the Launch Dayton Startup Week Early Risers Pitch Competition, where 10 local startups will compete for cash + prizes, starting at 6p.&lt;/p&gt;

&lt;p&gt;Want to pitch &amp;amp; win up to $5K in cash + prizes? Apply here by Aug. 13: &lt;a href="https://bit.ly/PitchLaunchDaytonStartupWeek2021" target="_blank"&gt;&lt;font color="#000000"&gt;&lt;font color="#000000"&gt;https://bit.ly/PitchLaunchDaytonStartupWeek2021&lt;/font&gt;&lt;/font&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Hear &amp;amp; network with:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;Mile Two founders Jeff Graley and Jorge Sanchez talk about growing from a four-man shop during the first Startup Week to landing a $15M government contract;&lt;/li&gt;

  &lt;li&gt;Maximize the Money You Have — Financial guru Emerald Sparks &amp;amp; Arcani Coil Care founder Jerricha Hoskins will talk about getting out of the mindset that someone else will give you money to launch your business;&lt;/li&gt;

  &lt;li&gt;A panel of business owners will discuss Doing Business in 2020 —we’ll talk about the challenges of the pandemic and rising hate crimes, as well as opportunities stemming from the recent push for racial justice;&lt;/li&gt;

  &lt;li&gt;Marketing experts will debunk the most common marketing myths they hear from clients looking to launch or grow their business on a budget;&lt;/li&gt;

  &lt;li&gt;Neurosurgeon turned entrepreneur &amp;amp; investor Dave Kirschman will share his story, from his entrepreneurial start in a college dorm room to his $90M X-spine Systems exit. His current company, Aerobiotix, produces an air filtration system for operating rooms.&lt;/li&gt;

  &lt;li&gt;Nickole Ross, cofounder of the only minority-owned and Black woman-operated processing facility in Ohio’s burgeoning cannabis industry, will sit down with What’s The Biz founder Te’Jal Cartwright to talk about breaking into an industry that has disproportionately harmed her community.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Register here: &lt;a href="https://bit.ly/LaunchDaytonStartupWeek2021" target="_blank"&gt;&lt;font color="#000000"&gt;&lt;font color="#000000"&gt;https://bit.ly/LaunchDaytonStartupWeek2021&lt;/font&gt;&lt;/font&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 19px;"&gt;Work On Your Business:&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Tuesday through Thursday, dig deeper into your business with industry-specific tracks and get hands-on with various workshop opportunities. We'll kick off after lunch and go until 8p to create more opportunities for aspiring founders to attend. Partners have curated a series of offerings for founders innovating in the areas of:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Tuesday, Sept. 14&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;MedTech, curated by &lt;a href="https://www.bioohio.com/" target="_blank"&gt;BioOhio&lt;/a&gt;;&lt;/li&gt;

  &lt;li&gt;SaaS, curated by &lt;a href="https://www.technologyfirst.org/" target="_blank"&gt;Technology First&lt;/a&gt;;&lt;/li&gt;

  &lt;li&gt;Business 101 classes, curated by Parallax’s Early Risers Academy;&lt;/li&gt;

  &lt;li&gt;Marketing workshops, curated by &lt;a href="https://www.lmgresults.com/home" target="_blank"&gt;LMG&lt;/a&gt;&lt;/li&gt;

  &lt;li&gt;Elevator pitch practice — in an actual elevator&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Wednesday, Sept. 15&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;Food/Bev/Retail/Consumer Products, curated by &lt;a href="https://www.downtowndayton.org/" target="_blank"&gt;Downtown Dayton Partnership&lt;/a&gt; and the Arcade Kitchen Incubator;&lt;/li&gt;

  &lt;li&gt;Artists + Creative Entrepreneurs, curated by &lt;a href="https://cultureworks.org/" target="_blank"&gt;CultureWorks&lt;/a&gt; &amp;amp; hosted by &lt;a href="https://thecontemporarydayton.org/" target="_blank"&gt;The Contemporary&lt;/a&gt;;&lt;/li&gt;

  &lt;li&gt;Scaleup workshops on value prop, financials and investment models, curated by the Entrepreneurs’ Center;&lt;/li&gt;

  &lt;li&gt;A million-dollar women founders panel, curated by &lt;a href="https://aviatraaccelerators.org/get-started/dayton-ohio-programs/" target="_blank"&gt;Aviatra Accelerators —Dayton&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Thursday, Sept. 16&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;Defense, curated by Parallax Advanced Research and sponsored by &lt;a href="https://infinitemanagementsolutions.net/" target="_blank"&gt;Infinite Management Solutions&lt;/a&gt; &amp;amp; &lt;a href="https://treble-one.com/" target="_blank"&gt;Treble One Aerospace&lt;/a&gt;;&lt;/li&gt;

  &lt;li&gt;Future Tech, curated by &lt;a href="https://www.ohiox.org/" target="_blank"&gt;OhioX&lt;/a&gt;;&lt;/li&gt;

  &lt;li&gt;Marketing workshops, curated by LMG&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Register here: &lt;a href="https://bit.ly/LaunchDaytonStartupWeek2021" target="_blank"&gt;&lt;font color="#000000"&gt;&lt;font color="#000000"&gt;https://bit.ly/LaunchDaytonStartupWeek2021&lt;/font&gt;&lt;/font&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Join us in-person by entering the Dayton Arcade via &lt;a href="https://www.thehubdayton.com/" target="_blank"&gt;The Hub Powered by PNC&lt;/a&gt;, at 31. S. Main Street, downtown Dayton. Park at the Reibold Garage on Fifth Street, or park at meters available around the building.&lt;/p&gt;

&lt;p&gt;Prefer to attend virtually? Register now, and as the conference gets closer, we'll send you a link to download the official Launch Dayton Startup Week app. The app, available on iOS, Android and the web, will allow you to personalize your schedule, attend sessions, connect with attendees, find resources, and win prizes.&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10782489</link>
      <guid>https://www.technologyfirst.org/Tech-News/10782489</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Thu, 15 Jul 2021 17:23:45 GMT</pubDate>
      <title>Afidence Announces Sale of Managed IT Services Division to Intrust IT</title>
      <description>&lt;p align="left"&gt;&lt;strong&gt;&lt;font style="font-size: 24px;"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/Afidence%20logo.PNG" alt="" title="" border="0" width="231" height="39"&gt;&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p align="left"&gt;&lt;font style=""&gt;&lt;font style="font-size: 18px;"&gt;Afidence, a technology consulting and services firm headquartered in Mason, has announced it has sold its managed IT services division to Blue Ash-based Intrust IT.&lt;/font&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/Photo%201.jpg" alt="" title="" border="0" width="244" height="234"&gt;&lt;br&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" face="Verdana" color="#099AC6"&gt;From left to right: Afidence co-owners Bryan Hogan and Barbara Hogan.&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;br&gt;&lt;/p&gt;

&lt;p&gt;The move will allow Afidence to focus on serving its mid-market and enterprise clients, with services that primarily include project management, cloud/infrastructure, cybersecurity and application development.&lt;/p&gt;

&lt;p&gt;“We are so grateful and appreciative of our managed IT services clients and our devoted team members who have served them throughout the years. These relationships mean the world to us,” said Bryan Hogan, CEO/president and co-owner at Afidence. “Our managed IT services clients and team are in a position to thrive with Intrust IT—an organization focused on providing managed IT services,” said Hogan.&lt;/p&gt;

&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/Photo%204.jpg" alt="" title="" border="0" width="267" height="219"&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" face="Verdana" color="#099AC6"&gt;Intrust IT CEO Tim Rettig.&lt;/font&gt;&lt;br&gt;&lt;/p&gt;

&lt;p&gt;“We cannot be happier knowing Intrust IT is the ideal organization to take our managed IT services clients and team to the next level,” said Barbara Hogan, co-owner of Afidence, who explained that intensive consideration went into the decision to divest this portion of the business. “We’re also pleased that every managed IT services team member will have continued employment with Intrust IT,” she said.&lt;/p&gt;

&lt;p&gt;Afidence is ensuring all clients and employees will be transitioned smoothly into a company culture that embraces the same core values as Afidence, according to Bryan Hogan. “Those values include an emphasis on strong relationships that are rooted in trust and transparency,” he said. “During this process, it has been—and continues to be—our top priority to ensure both our employees and clients will flourish as a result of this transition.” &amp;nbsp;&lt;/p&gt;

&lt;p&gt;Intrust IT, an IT support and cybersecurity company, primarily serves small and medium-sized businesses in the greater Cincinnati area. In 2019, Intrust IT became employee owned through an Employee Stock Ownership Plan (ESOP). For the past several years, Intrust IT has reported customer satisfaction scores of 99 percent or higher. Intrust IT has also been nationally recognized with an All-Star Champion award from the Great Game of Business (GGOB) thanks to its excellence in implementing open book management practices. Intrust IT has been a finalist for the Business Courier's Best Places to Work awards nine of the last ten years.&lt;/p&gt;

&lt;p&gt;Intrust IT CEO Tim Rettig said the deal developed through an existing relationship between Afidence and Intrust IT, adding how the two firms share a dedication to company culture and customer service. “We’re like-minded in our approach to serving and supporting clients and our focus on fostering a healthy, positive company culture,” said Rettig. “We’re pleased this deal makes our ESOP stronger and expands the benefit to a larger group. We’re excited to bring these new staff members onto our award-winning team, and we look forward to continuing to provide stellar service to the managed IT clients of Afidence.”&lt;/p&gt;

&lt;p&gt;Hogan added this is a milestone step for Afidence as they enter a new phase of expansion. “Our company was built on serving mid-market and enterprise clients, and this enables us to have a singular focus that will give us the opportunity to have even greater impact going forward,” he said.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;About Afidence&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Since 2010, Afidence—a name which stems from Latin for “joining in trust”—has provided clients with unbiased, real-time business and IT solutions. Built on a foundation of integrity, quality, and strong relationships, Afidence relentlessly serves the best interests of clients, employees, and colleagues. Headquartered in Mason, Afidence specializes in project management, cloud/infrastructure, cybersecurity and application development. Afidence’s proven syncMETHODOLOGY™ process ensures that each step and deliverable is proactively communicated in an easy to understand, open and transparent manner. To learn more about Afidence, visit &lt;a href="http://www.afidence.com/"&gt;www.afidence.com&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;About Intrust IT&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Intrust IT is a Cincinnati IT support and cybersecurity partner that gets you and gets back to you. As a locally owned small business, Intrust IT empathizes with business owners, uses ingenuity to solve problems and delivers service that makes clients happy. Intrust IT was founded in 1992 by Tim Rettig and ever since, has been putting the “service” in “managed services.” As of 2019, Intrust IT is an employee-owned company. By growing together as a business, team members inspire each other and clients in a new way to do more and impact the region. Visit www.intrust-it.com to learn more.&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10782479</link>
      <guid>https://www.technologyfirst.org/Tech-News/10782479</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Thu, 01 Jul 2021 19:58:30 GMT</pubDate>
      <title>Like a Pirate Ship Sailing Into a Yacht Club</title>
      <description>&lt;p&gt;&lt;font color="#DD4A3A"&gt;Mardi Humphreys, Change Agent Integration Edge&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/ship%20(002)-%20mardi.JPG" alt="" title="" border="0" width="593" height="414"&gt;&lt;br&gt;&lt;/p&gt;

&lt;p&gt;I made this poster to hang in my office. (Full disclosure: Since the pandemic my office is actually the dog’s bedroom. Yes. The dog has his own room. Don’t ask.) I made the poster to remind myself that innovation is often only appreciated in hindsight. While modern-day pirates are a serious threat to certain areas of the world (e.g., West Africa and Somalia) and should be treated as such, my poster represents archetypal pirates like Blackbeard who was known not only for his leadership and non-violent nature, but also for his boldness, personal courage, and brand awareness; all important elements of innovation. Here in Dayton, OH we have a lot to live up to in terms of innovation. There’s the obvious: The Wright Brothers, Ermal Fraze, Charles F. Kettering, et al; but what about you? Your business is IT. Aren’t you innovating almost daily? There are basically three types of innovation: product, process, and business model:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Product&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Since we work in Information Technology, this is the type of innovation we most likely think of when we hear the word because we see it all the time. Think: combining an MP3 player with a mobile phone (more on this later).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Process&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This is where I live. We streamline SMBs’ and non-profits’ workflows and procedures to eliminate waste and human error, and to increase data security. We automate as many steps in their processes as possible, thus saving them time, energy, attention, and money. Think: a physician sending your prescription to your preferred pharmacy online instead of writing it out and handing it to you on a piece of paper.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Business Model&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This is the most drastic innovation because it affects the entire organization. It’s most successful in startups because they’re still experimenting with how to structure their businesses. It usually occurs when the person in charge starts wondering out loud why customers aren’t buying. Think Amazon.&lt;/p&gt;

&lt;p&gt;You see innovation and you are innovative, but do you act on that innovation? When you have an idea you believe will change the course of the product, process, or profession, what keeps you from acting on it? Innovators have at least three things in common:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Bravery&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Innovation is scary. You have to put yourself out there. Brene Brown says, “Vulnerability is the birthplace of innovation, creativity and change.” As the Change Agent for Integration Edge. I have to sit with vulnerability a lot. Change is hard. Even good change, like growth, is still difficult. There’s a reason growing pains is a cliché.&amp;nbsp; Humans are creatures of habit. We love doing what we’ve always done. It’s getting what we’ve always gotten that we don’t like. That’s where innovation enters the equation. One of my favorite things about innovation is that it seems so epic; but in reality, one little change can be that last push the flywheel needs to start turning as fast as you’d hoped it could.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Boldness&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Back in the &lt;strong&gt;Product&lt;/strong&gt; section of this article, I promised more to the story of combining an MP3 player with a mobile phone. Here it is, long story short: When a small team of engineers, designers, and marketers at Apple presented the idea to Steve Jobs, he vehemently opposed it. But his team saw the potential both in the technology and the market, and kept gently persuading and boldly negotiating with Jobs until he agreed. Four years after it launched, the iPhone was responsible for half of Apple’s revenue. Innovators don’t ask their customers what they want. Innovators ask their customers what they want outcomes to be. iPod customers did not suggest that Apple combine the iPod with a mobile phone. They just wanted to stop carrying multiple devices.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Brand Awareness&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Innovation is ineffective if it’s a secret. In development you need secrecy, but once you’re in production you have to tell the world about it. It’s okay to get excited about projects that improve our clients’ businesses. You worked hard. Tell everyone who will listen. The more organizations you impact, the more innovative you’ll be and the more your reputation will grow. I learned this lesson from Edward Teach. Back in 1717 he commandeered a slave ship, La Concorde, disembarked the people at Bequia, then proceeded to acquire two more ships and 150 crew members. Teach was big and tall. In battle, he dressed in dark clothing with a sling over his shoulders that held a brace of three pistols. He wore a wide hat under which he put lit matches to appear fierce. He did this to intentionally make a reputation for himself that would scare his enemies so that he did not have to hurt them. (We have no verified account he ever harmed any of his captives.) Like Teach, we want to cultivate a certain reputation because we understand the value of appearances. How valuable was his appearance? Teach renamed the slave ship that he commandeered Queen Anne’s Revenge. Edward Teach renamed himself Blackbeard.&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10718689</link>
      <guid>https://www.technologyfirst.org/Tech-News/10718689</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Thu, 01 Jul 2021 17:39:09 GMT</pubDate>
      <title>Bridging the Development Gap</title>
      <description>&lt;h2&gt;Future of No-Code Bright, but Challenges Remain&lt;/h2&gt;

&lt;p&gt;&lt;font color="#DD4A3A"&gt;Matt Coatney, CIO, Thompson Hine LLP &amp;amp; Technology First Board of Directors&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;Several years ago, I led professional services for a data analytics no-code/low-code company. We built cutting-edge solutions for healthcare, life sciences, finance, and more using our trailblazing platform.&lt;/p&gt;

&lt;p&gt;There was one problem though. Consulting was a great revenue stream, but business wants the recurring revenue of licensing and “citizen developer” self-service. But no matter how much we tried to convince companies they could build applications with our tool, inevitably they would lean back on us instead.&lt;/p&gt;

&lt;p&gt;I call this the Development Gap: the gulf between organizations’ application needs, the availability and technical sophistication of their business teams, and the state of no-code platforms. The gap is still too wide for the average company to get real, transformative benefit from these tools., But I remain optimistic in the long run.&lt;/p&gt;

&lt;p&gt;There is a lot of hype around products like Microsoft PowerApps that promise “anyone can build an app.” I recently surveyed the landscape, tried out several tools, and admittedly walked away disappointed. Most tools approach the space in a similar way and focus on basic use cases: form data entry, editable lists of items, and dashboards. While you can create some useful apps with those building blocks, it is not much more than a glorified online spreadsheet with a few more bells and whistles.&lt;/p&gt;

&lt;p&gt;But if you want to make an immersive application experience? Forget about it. Even something as simple as uploading a file and performing an action in real-time proved difficult in these platforms. In many cases, the user must write code to accomplish more than trivial use cases, and we are right back where we started. Non-developers are either overwhelmed by the interface or stymied by limited functionality, and developers will not use the tools because, well, they love to write code.&lt;/p&gt;

&lt;p&gt;So why am I still optimistic? For one, the market demand has increased significantly, and investment dollars have followed. Plus, with several large players pushing into this space, I expect significant improvements over the next five years in user interface design, reusable component libraries, and AI-enabled automation. Additionally, as younger tech-natives enter the workforce, they are more attuned to how software works, and while they are not developers, they often have a better grasp of data and business logic.&lt;/p&gt;

&lt;p&gt;In the meantime, what can you do to help bring innovative applications to your organization more quickly (the promise of no-code)? One way is to leverage more mature self-service platforms for targeted use cases, especially in the area of data reporting and dashboards. Your development teams can also spend more of their scarce time building platforms to support rapid development and self-service, rather than bespoke business unit solutions. And development teams can also further embrace agile iterative development with shorter cycle times, which ultimately bring product to market quicker.&lt;/p&gt;

&lt;p&gt;These steps will help you advance innovation initiatives while we all wait for the Development Gap to get just a bit narrower.&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10711517</link>
      <guid>https://www.technologyfirst.org/Tech-News/10711517</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Thu, 01 Jul 2021 14:14:39 GMT</pubDate>
      <title>Tech First Teams up with Girl Scouts!</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/CSA%20Cyber%20Challenge%20july%2023%20banner.jpg" alt="" title="" border="0" width="547" height="286"&gt;&lt;/p&gt;

&lt;p&gt;Technology First has teamed up with Girl Scouts of Western Ohio for a CSA Cyber Challenge with support of the Ohio Cyber Range Institute!&lt;/p&gt;

&lt;p&gt;Volunteers from Technology First’s membership will lead a series of “plugged” and “unplugged” cyber challenges to over 50 Girl Scouts grades 6-12. This event will take place on July 23rd at the University of Cincinnati’s 1819 Innovation Hub. Participating companies include 84.51, CareSource, Great American Insurance Group, Kettering Health, Kroger, P&amp;amp;G, and the University of Cincinnati.&lt;/p&gt;

&lt;p&gt;If you know a Girl Scout interested in participating, they can &lt;a href="https://mygs.girlscouts.org/event-detail?id=240-2021CYBER-MR101&amp;amp;fbclid=IwAR2ZehTm8HZEhy_KCTagcwRtpWBvkztzu6FPursD5FAYtUOaYoaK9MXcPz4" target="_blank"&gt;register by Friday, July 9th&lt;/a&gt;!&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10731808</link>
      <guid>https://www.technologyfirst.org/Tech-News/10731808</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Wed, 30 Jun 2021 17:07:48 GMT</pubDate>
      <title>Inclusive Recovery for Ohio - JobsOhio</title>
      <description>&lt;p style="line-height: 24px;"&gt;&lt;font face="Verdana"&gt;Business Leaders and Community Stakeholders,&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 24px;"&gt;&lt;font face="Verdana"&gt;A successful and sustainable recovery for Ohio must include all Ohioans. Nearly 20% of Ohioans live in distressed areas—defined as areas that have not recovered from the last recession. The COVID-19 pandemic further disproportionally impacted these communities and their residents. It is critical that we support these areas of the state to help them and Ohio overall with post-pandemic economic recovery.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 24px;"&gt;&lt;font face="Verdana"&gt;These communities are home to businesses with intellect that can benefit all of Ohio. JobsOhio is prioritizing efforts to empower the businesses with the resources they need to reach their potential. Since the start of 2020, we have worked on an inclusion strategy that focuses on investing in and driving job creation to Ohio’s distressed areas as well as providing the capital needed to grow the businesses in these communities and those owned by underserved populations.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 24px;"&gt;&lt;font face="Verdana"&gt;One component of this strategy is the &lt;a href="https://www.ohioforbiz.com/e/131921/why-ohio-inclusion-grant-/64qx7k/680771956?h=stQEOkgQoodZUctJXwSbRAR5gW43o5Hib3gYu46LKaQ" target="_blank"&gt;&lt;font&gt;JobsOhio Inclusion Grant&lt;/font&gt;&lt;/a&gt;, which was created in July 2020 as part of JobsOhio’s COVID relief programming. The program puts funding of up to $50,000 for small and medium-sized businesses located in distressed areas of the state and owned by underrepresented population groups. As of today:&lt;/font&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li style="line-height: 24px;"&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;133 companies have closed deals or are currently in the pipeline.&lt;/font&gt;&lt;/li&gt;

  &lt;li style="line-height: 24px;"&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;Over 4,287 jobs have been created or retained.&lt;/font&gt;&lt;/li&gt;

  &lt;li style="line-height: 24px;"&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;Of these projects, 82% are in distressed communities, 23% are woman owned, 21% are minority owned, and 11% are veteran owned.&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style="line-height: 24px;"&gt;&lt;font face="Verdana"&gt;Some of the participating homegrown businesses include &lt;a href="https://www.ohioforbiz.com/e/131921/y-sustainable-during-covid-19-/64qx7m/680771956?h=stQEOkgQoodZUctJXwSbRAR5gW43o5Hib3gYu46LKaQ" target="_blank"&gt;&lt;font&gt;The Chef’s Garden&lt;/font&gt;&lt;/a&gt;, an agriculture company that pivoted its business model due to the pandemic, and &lt;a href="https://www.ohioforbiz.com/e/131921/ng-manufacturing-back-to-ohio-/64qx7p/680771956?h=stQEOkgQoodZUctJXwSbRAR5gW43o5Hib3gYu46LKaQ" target="_blank"&gt;&lt;font&gt;MAKO Finished Products&lt;/font&gt;&lt;/a&gt;, a rural Ohio-based business that helps power a leading fitness brand. After a successful first year in providing $5 million in financial support to small and medium-sized businesses, the JobsOhio Board of Directors recently approved an increase of up to $8 million in 2021 due to the success and growing interest from local businesses.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 24px;"&gt;&lt;font face="Verdana"&gt;Our efforts to ensure Ohio’s recovery is inclusive of all Ohio continue and we will share more in future updates.&lt;/font&gt;&lt;/p&gt;

&lt;table cellspacing="0" cellpadding="0" width="100%" height="50" style="border-collapse: collapse;" align="center"&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;
        &lt;table cellspacing="0" cellpadding="0" width="40%" style="border-collapse: collapse;"&gt;
          &lt;tbody&gt;
            &lt;tr&gt;
              &lt;td&gt;
                &lt;p align="center"&gt;&lt;a href="https://www.ohioforbiz.com/e/131921/why-ohio-inclusion-grant-/64qx7k/680771956?h=stQEOkgQoodZUctJXwSbRAR5gW43o5Hib3gYu46LKaQ" target="_blank"&gt;&lt;font style="font-size: 16px;"&gt;&lt;strong&gt;&lt;font face="Verdana"&gt;Learn more about the JobsOhio Inclusion Grant&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/a&gt;&lt;/p&gt;
              &lt;/td&gt;
            &lt;/tr&gt;
          &lt;/tbody&gt;
        &lt;/table&gt;
      &lt;/td&gt;
    &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10721285</link>
      <guid>https://www.technologyfirst.org/Tech-News/10721285</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Tue, 29 Jun 2021 14:08:58 GMT</pubDate>
      <title>Technology First leader on the move!</title>
      <description>&lt;P&gt;&lt;IMG src="https://www.technologyfirst.org/resources/Pictures/Headshots/treg%20gilstorf.png" border="0"&gt;&lt;BR&gt;&lt;/P&gt;

&lt;P&gt;Treg Gilstorf has been selected chief operating officer for Smart Data, a local IT services provider and Technology First Member.&lt;/P&gt;

&lt;P&gt;Treg is Vice Chair of the Technology First Board and has 25+ years of experience in IT, strategic planning, process improvement, consulting, operations and project management. Prior to joining Smart Data, he spent eight years as chief information officer at Yaskawa Motoman, the Miamisburg-based robotics division of Yaskawa Electric Corp. Before that, he held leadership roles for companies throughout Southwest Ohio and Indiana — including Cincinnati-based Fifth Third Bank, Afidence and Luxottica; as well as Duke Energy’s operations in Indianapolis.&lt;/P&gt;

&lt;P&gt;Congratulations on the new adventure, Treg!&lt;/P&gt;

&lt;P&gt;&lt;BR&gt;&lt;/P&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10731762</link>
      <guid>https://www.technologyfirst.org/Tech-News/10731762</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Mon, 28 Jun 2021 17:03:39 GMT</pubDate>
      <title>Dayton Region Intern Appreciation Week</title>
      <description>&lt;p align="left"&gt;&lt;em&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Celebrate Interns in your organization (July 12-16, 2021)&lt;/font&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p align="left"&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;strong&gt;&lt;font&gt;DAYTON&lt;/font&gt;&lt;/strong&gt;&lt;font&gt;, Ohio&amp;nbsp;(June&amp;nbsp;28,&amp;nbsp;2021) –&amp;nbsp;The Southwestern Ohio Council for Higher Education (SOCHE)&amp;nbsp;leads several initiatives to&amp;nbsp;increase internships and close workforce gaps in Ohio. The Dayton Region recognizes the immense value of interns in workplaces and communities. Dayton Region Internship Appreciation Week encourages Southwestern Ohio companies to show their appreciation for interns at all levels. Companies can visit &lt;u&gt;&lt;font color="#0000FF"&gt;&amp;nbsp;&lt;/font&gt;&lt;/u&gt;&lt;/font&gt;&lt;a href="https://bit.ly/3hL2ZvT"&gt;&lt;font&gt;https://bit.ly/3hL2ZvT&lt;/font&gt;&lt;/a&gt;&lt;font&gt;&amp;nbsp;for ideas on how to thank their interns.&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p align="left"&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;font&gt;Several Mayors in the Miami Valley have issued proclamations to declare Intern Appreciation Week for their city from July 12 – 16, 2021.&amp;nbsp; Thanks much to the cities&amp;nbsp;of Springfield, Beavercreek, Trotwood, and Centerville! Other cities are welcome to join!&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p align="left"&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;SOCHE’s&amp;nbsp;member colleges and universities, representing&amp;nbsp;nearly 200,000&amp;nbsp;students,&amp;nbsp;participate in thousands of internships throughout the year. These 200,000 students, in addition to all the region’s high school students, are the future workforce. Hiring these students boosts the likelihood that they will remain in the area as full-time employees.&lt;/font&gt;&lt;/p&gt;

&lt;p align="left"&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;“We’re proud of the&amp;nbsp;ever-increasing intern numbers across the region and we hope that employers and colleges and universities&amp;nbsp;are&amp;nbsp;equally proud of&amp;nbsp;the&amp;nbsp;progress,”&amp;nbsp;said&amp;nbsp;Cassie Barlow,&amp;nbsp;President&amp;nbsp;of SOCHE.&amp;nbsp;“Every year we work to strengthen and evolve partnerships between the private sector and higher education to provide more internship opportunities in Ohio,”&amp;nbsp;Barlow&amp;nbsp;added.&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p align="left"&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;font&gt;SOCHE’s internship program employs hundreds of students, high school through the post-doctoral level, in many&amp;nbsp;positions to support Wright Patterson Air Force Base, the City of Dayton, and Montgomery County, as well as numerous small and mid-sized companies. Internship roles call for students majoring in various subjects, including science, technology, engineering, math, arts, business, social sciences, manufacturing, and humanities&amp;nbsp;majors&lt;/font&gt;&lt;font&gt;.&lt;/font&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p align="left"&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;font&gt;Patty Buddelmeyer,&amp;nbsp;Vice President of Development at&amp;nbsp;SOCHE,&amp;nbsp;added, “We’re excited to see more and more employers with interns&amp;nbsp;in the Dayton region. Businesses are experiencing the value interns bring to workplaces. The rising internship numbers speak to the commitment of the local business community and colleges and universities to retain talented and engaged students in the region.”&amp;nbsp;&lt;/font&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p align="left"&gt;&lt;br&gt;&lt;/p&gt;

&lt;p align="left"&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;font color="#000000"&gt;Formed in 1967,&amp;nbsp;SOCHE is the trusted and recognized regional leader for higher collaboration, working with colleges and universities to transform their communities and economies through the education, employment, and engagement of nearly 200,000 students in southwest Ohio.&amp;nbsp;SOCHE is home to&amp;nbsp;SOCHEintern, the Aerospace&amp;nbsp;Professional Development Center (APDC), and&amp;nbsp;Defense Associated Graduate Student Innovators (DAGSI).&amp;nbsp;For&amp;nbsp;more information about SOCHE&amp;nbsp;and all SOCHE initiatives, visit&amp;nbsp;&lt;/font&gt;&lt;a href="http://r20.rs6.net/tn.jsp?llr=watrx4cab&amp;amp;et=1104083659546&amp;amp;s=4750&amp;amp;e=0011l2jSFzt_jl9Wwt2YiQnJh7lqiQknQXtiisWpe8312-88VDhWl7KTBkcnkahf_xcO3uTjXx1Ci4aYWTUVbk0uiO52IU0vJL72Rc7UJ1qe2M="&gt;&lt;font color="#0000FF"&gt;http://www.soche.org/&lt;/font&gt;&lt;/a&gt;&lt;font color="#000000"&gt;.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10721279</link>
      <guid>https://www.technologyfirst.org/Tech-News/10721279</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Thu, 27 May 2021 17:00:45 GMT</pubDate>
      <title>UPSKILL your workforce through TechCred</title>
      <description>&lt;p&gt;&lt;a href="https://www.technologyfirst.org/resources/Documents/TechCred_TechFirst_June.pdf" target="_blank"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/SinclairTechCredJune1.PNG" alt="" title="" border="0"&gt;&lt;/a&gt;&lt;br&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.technologyfirst.org/resources/Documents/TechCred_TechFirst_June.pdf" target="_blank"&gt;TechCred_TechFirst_June.pdf&lt;/a&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10563971</link>
      <guid>https://www.technologyfirst.org/Tech-News/10563971</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Wed, 26 May 2021 16:56:43 GMT</pubDate>
      <title>Enhancing MLOps with Azure Machine Learning</title>
      <description>&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;font color="#DD4A3A"&gt;&lt;font&gt;BY&amp;nbsp;&lt;/font&gt;&lt;font&gt;BEN PRESCOTT&lt;/font&gt;, AHEAD&amp;nbsp;&lt;/font&gt;-&amp;nbsp;&lt;span style="background-color: white;"&gt;&lt;font&gt;This article originally appeared on&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;a href="https://www.ahead.com/resources/enhancing-mlops-with-azure-machine-learning/" title="https://www.ahead.com/resources/nist-privacy-framework/" target="_blank"&gt;&lt;font&gt;&lt;span style="background-color: white;"&gt;&lt;font&gt;AHEAD's i/o blog&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/a&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#333333" face="Verdana" style="font-size: 18px;"&gt;Recall the year 2013. The world has just topped four zettabytes of generated data (equal to four trillion gigabytes). The term “big data” is taking hold, creeping into every corner of the tech and business worlds.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#333333" face="Verdana" style="font-size: 18px;"&gt;From that point on, data volumes have grown exponentially. It’s estimated that the world produced more than 44 zettabytes of data by the end of 2020 (growing by a factor of 11 in just seven years). We’re now generating more data than we can effectively manage—and it’s a big problem.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#333333" face="Verdana" style="font-size: 18px;"&gt;Today’s organizations are searching for ways to harness, manage, and analyze these huge influxes of information. Many are&amp;nbsp;turning to machine&amp;nbsp;learning&amp;nbsp;(ML)&amp;nbsp;and&amp;nbsp;deep&amp;nbsp;learning&amp;nbsp;(DL) models to analyze data and predict what could happen next. In fact, organizations across every industry use ML and DL today in various capacities.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#333333" face="Verdana" style="font-size: 18px;"&gt;Healthcare innovates pathology detection by leveraging neural networks and tracking patient patterns to predict their length of stay. The pharmaceutical industry uses ML and DL to identify causal factors of diseases for drug development and predict patient response to drug combinations. Manufacturing organizations identify product defects, predict machine malfunctions before they even happen to provide proactive maintenance, and use generative design methods to determine the best structural design for a product (such as a car frame).&amp;nbsp;From a general business perspective, many organizations leverage ML to aid in forecasting business revenue, schedule resources for projects, and drive sales and marketing efficiency.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#333333" face="Verdana" style="font-size: 18px;"&gt;But building and training effective machine learning models is no easy task. Add the maintenance (operations) component and achieving true machine learning operations (MLOps) is difficult for most organizations.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#333333" face="Verdana" style="font-size: 18px;"&gt;That’s why a platform like Azure Machine Learning can be beneficial. Azure ML is a hosted service that enables and enhances an organization’s MLOps capabilities through four key benefits:&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;font color="#333333"&gt;1.&lt;font&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/font&gt; &lt;font color="#333333"&gt;Graphical interface&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;font color="#333333"&gt;2.&lt;font&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/font&gt; &lt;font color="#333333"&gt;Out-of-the-box machine learning models&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;font color="#333333"&gt;3.&lt;font&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/font&gt; &lt;font color="#333333"&gt;Single pane of glass view&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;font color="#333333"&gt;4.&lt;font&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/font&gt; &lt;font color="#333333"&gt;Direct integration with Git and Azure DevOps&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#333333" face="Verdana" style="font-size: 18px;"&gt;Before we dive into the ins and outs of Azure MLOps, let’s define MLOps.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;strong&gt;&lt;font color="#333333"&gt;What is&amp;nbsp;MLOps?&lt;/font&gt;&lt;/strong&gt;&lt;font color="#333333"&gt;&amp;nbsp;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#333333" face="Verdana" style="font-size: 18px;"&gt;MLOps blends DevOps methodologies and processes with the ML development process. There’s a lot that goes into the process of developing ML models, from collecting and cleaning data, to model training, validation, and deployment. But, while the goal is to deploy a model into production, monitoring and maintaining that model are just as, if not more, critical.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#333333" face="Verdana" style="font-size: 18px;"&gt;Within the DevOps umbrella are concepts known as Continuous Integration and Continuous Delivery (CI/CD), a way to shorten development and deployment cycles while maintaining quality code. While DevOps plays a critical role in core application development,&amp;nbsp;MLOps&amp;nbsp;puts a twist on CI/CD. Within MLOps, CI validates data quality and structure, and CD broadens focus to the full ML solution.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#333333" face="Verdana" style="font-size: 18px;"&gt;MLOps&amp;nbsp;also introduces a new concept—pushing the deployed ML model back through the training and validation process, often referred to as Continuous Training (CI/CD/CT). This is a way of ensuring the model doesn’t become stale, having only “seen” aging data. It also continually evaluates and improves a model’s ability to predict. After all, the last thing you want is to make business decisions from a model that provides poor predictions or recommendations.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#333333" face="Verdana" style="font-size: 18px;"&gt;MLOps with Azure Machine Learning&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#333333" face="Verdana" style="font-size: 18px;"&gt;One of the biggest struggles of adopting MLOps is piecing together the services needed to support the full data lifecycle. Data scientists and machine learning engineers are traditionally really good at building robust models, but the process of deployment and monitoring is usually done manually, or not at all.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#333333" face="Verdana" style="font-size: 18px;"&gt;Once a model is in production and consuming new data, how is it monitored and retrained? The retraining process quickly becomes manual—going back through the same steps performed during development before pushing the retrained model back into production. As soon as it’s back in production, it’s out-of-date again. As with any iterative process, this becomes time-consuming, expensive, and frustrating.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#333333" face="Verdana" style="font-size: 18px;"&gt;Azure ML supports MLOps by giving teams a platform to manage models and integrate model usage, output, and insights across the organization. It does this through the areas we mentioned earlier—a graphical interface, out-of-the-box algorithms, single pane of glass approach, and integration capabilities.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#333333" face="Verdana" style="font-size: 18px;"&gt;Graphical Interface&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#333333" face="Verdana" style="font-size: 18px;"&gt;Azure ML&amp;nbsp;provides&amp;nbsp;both a&amp;nbsp;graphical&amp;nbsp;web&amp;nbsp;interface&amp;nbsp;(Azure ML Studio) as well as&amp;nbsp;SDKs that (at the time of writing) support Python, R,&amp;nbsp;and Azure CLI.&amp;nbsp;This is important because some organizations prefer to work in their existing environments while leveraging&amp;nbsp;the features and capabilities&amp;nbsp;of Azure ML.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#333333" face="Verdana" style="font-size: 18px;"&gt;Out-of-The-Box Algorithms&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#333333" face="Verdana" style="font-size: 18px;"&gt;Azure ML comes with many pre-built algorithms to help you get started quickly, including those for regression, text analysis, recommendation services,&amp;nbsp;and computer vision. In addition, Azure ML&amp;nbsp;Studio&amp;nbsp;boasts “Automated ML,” a no-code&amp;nbsp;solution to automatically find,&amp;nbsp;train,&amp;nbsp;and tune the best model for&amp;nbsp;your data.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#333333" face="Verdana" style="font-size: 18px;"&gt;Single Pane of Glass&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#333333" face="Verdana" style="font-size: 18px;"&gt;Azure ML takes a single pane of glass approach that provides capabilities in all areas of the MLOps lifecycle, while integrating with common DevOps services. Each capability within Azure ML can operate as an independent feature to help gradually grow MLOps maturity. Whether it’s data scientists making use of the notebooks and experimentation, infrastructure engineers managing the CPU or GPU-backed compute infrastructure, or security teams leveraging Azure ML’s model change tracking logs, everyone has a role to play in embracing an MLOps methodology. Azure ML helps make this transition easier by providing ready-to-be-consumed services.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#333333" face="Verdana" style="font-size: 18px;"&gt;Integration with Git and Azure DevOps&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#333333" face="Verdana" style="font-size: 18px;"&gt;Integrating Azure ML with Git and Azure DevOps offers many automation opportunities that are otherwise not accessible:&lt;/font&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;font color="#333333" face="Verdana" style="font-size: 18px;"&gt;Enables the use of Azure DevOps Pipelines to automate the data ingestion process and perform data checks&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font color="#333333" face="Verdana" style="font-size: 18px;"&gt;Provides the ability to automate the Continuous Training and Continuous Deployment aspects of the MLOps lifecycle, removing the need to manually retrain models as performance degrades&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font color="#333333" face="Verdana" style="font-size: 18px;"&gt;Automates scaling of compute resources for model training, both up and out, and provides a one-stop-shop for managing backend compute needs&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font color="#333333" face="Verdana" style="font-size: 18px;"&gt;Automates deployment of trained/retrained models to internal- and external-facing services on Azure Kubernetes Services, Azure App Services, Azure Container Instances, or Azure Virtual Machines, and removes the need to manually deploy new or retrained models&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;font color="#333333" face="Verdana" style="font-size: 18px;"&gt;At the end of the day, it’s better to back your MLOps with tools that will get you there better and faster, and that’s just what the Azure ML platform does.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;font color="#333333"&gt;To learn more about how Azure ML can help your organization leverage machine learning,&amp;nbsp;&lt;/font&gt;&lt;a href="mailto:contact@ahead.com" target="_blank"&gt;&lt;font color="#000000"&gt;&lt;font color="#0000FF"&gt;reach out to our team&lt;/font&gt;&lt;/font&gt;&lt;/a&gt;&lt;font color="#333333"&gt;.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10557911</link>
      <guid>https://www.technologyfirst.org/Tech-News/10557911</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Tue, 25 May 2021 17:30:51 GMT</pubDate>
      <title>Once Upon a Time</title>
      <description>&lt;p&gt;&lt;font color="#DD4A3A" style="font-size: 18px;"&gt;Mardi Humphreys, Change Agent, Integration Edge/RDSI&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;I’m a storyteller and I love data analytics. These two things may seem mutually exclusive, but bear with me. Data analysis is a process. So is storytelling. Data analysis inspects, cleanses, transforms, and/or models data. So does storytelling. You use data analytics to discover useful information, form conclusions, and support decision-making. So is… never mind; you know what goes here. Let me give you an example. Here’s the story of Goldilocks and the Three Bears as if they were all data analysts.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/mardi%201.jpg" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;Goldilocks finds an empty-looking cabin in the woods. She peeps in the window. She doesn’t see anyone inside. She knocks on the door. No one answers. She turns the knob and finds the door unlocked. Given this data, she decides to enter the cabin. The data she’s missing? The cabin belongs to a family of three bears: Papa, Mama, and Baby. The Bear family goes out to pick fresh blueberries every morning.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/mardi%202.jpg" alt="" title="" border="0" width="272" height="182"&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;Goldilocks gathers more data. There are three various-sized bowls of porridge on the dining room table. She tastes the contents of the biggest bowl. It burns her mouth. She tastes a spoonful from the medium-sized bowl. It’s cold. She tastes the porridge from the smallest bowl and finds it palatable. With this data, she discovered enough useful information to form a conclusion. She decides to eat the whole small bowl of porridge and leave the other two sitting.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/mardi%203.jpg" alt="" title="" border="0" width="284" height="213"&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;Goldilocks continues being nosy, er, I mean, gathering data. She wanders into the living room and spies three chairs. Full of porridge, she decides sitting a spell is a wise choice. She tries out Papa Bear’s large chair. She determines it is too hard to sit on. Next, she tries Mama Bear’s medium-sized chair. She determines it is too soft to sit on. Sticking to her data-gathering process, she moves on to Baby Bear’s tiny chair and gives it a sit. It’s perfect! She’s so excited her experiment worked, she does a happy dance and promptly breaks the chair. (Side note - This is why we never test anything in production.)&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/mardi%204.jpg" alt="" title="" border="0" width="284" height="201"&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;All this porridge eating and chair breaking made Goldilocks sleepy. She again wanders around the cabin; this time looking for a bed in which to nap. Refining and iterating her process based on feedback, she is not surprised to find three various-sized beds on the second floor. Continuing her data gathering process, she plops onto the ginormous Bed #1. She about breaks her back because it’s as hard as steel. Sticking to her method, she moves on to the medium-sized Bed #2. After wallowing in the piles of blankets and pillows, she decides it’s too soft. She moves on to test the smallest, Bed #3. It must have met her search criteria, because she falls asleep in it.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;Not long after, the owners of the cabin return from blueberry picking to find things are not as they left them. The data they first encounter is the dining room table with two bowls of half-eaten, Goldilocks-germ-infested porridge on it and one tiny bowl licked clean. This data leads them to believe someone’s been eating their porridge. This is a correct analysis of their collected data.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;The Bear family goes to the living room to see if there is more data to collect. They find their three chairs not as they left them. The big hard chair and the medium-sized soft chair are salvageable, but inspection of the smallest chair deems it transformed beyond repair. This additional data leads them to conclude a hungry vandal entered their house and may still be there. Another correct analysis of the collected data.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;Not finding anyone on the first floor, the Bear family angrily stomps upstairs to see if there is more data (or a full-bellied, chair-destroying vandal) to be collected. They find their three beds not as they left them. The biggest and medium-sized beds are now unmade and rumpled, but the covers on the smallest bed are rhythmically moving and snoring. This aggregated data leads the Bear family to the conclusion that the culprit who entered their cabin, ate their food, and broke their chair is now sleeping in their bed. Acting on their conclusion, the three angry bears roar and Goldilocks awakens.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;What have we learned about data analytics from this story?&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;&lt;font color="#099AC6"&gt;&lt;strong&gt;Goldilocks’ Data Analysis:&lt;/strong&gt;&lt;/font&gt;&lt;br&gt;
&lt;strong&gt;What insight did she gain?&lt;/strong&gt; The cabin offered three sizes of food, chairs, and beds&lt;br&gt;
&lt;strong&gt;What understanding did it build?&lt;/strong&gt; The third option always suited her best&lt;br&gt;
&lt;strong&gt;What decisions did it influence?&lt;/strong&gt; Eat, sit, sleep&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;&lt;font color="#099AC6"&gt;&lt;strong&gt;The Bears’ Data Analysis:&lt;/strong&gt;&lt;/font&gt;&lt;br&gt;
&lt;strong&gt;What insight did they gain?&lt;/strong&gt; They never had to lock the cabin door before&lt;br&gt;
&lt;strong&gt;What understanding did it build?&lt;/strong&gt; If they leave the cabin door unlocked, they may get robbed&lt;br&gt;
&lt;strong&gt;What decisions did it influence?&lt;/strong&gt; Whether or not to lock the cabin door&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;&lt;font color="#099AC6"&gt;&lt;strong&gt;Goldilocks’ Results:&lt;/strong&gt;&lt;/font&gt;&lt;br&gt;
&lt;strong&gt;How did she use her collected data?&lt;/strong&gt; To ransack The Bears’ cabin&lt;br&gt;
&lt;strong&gt;What innovation did she achieve?&lt;/strong&gt; She learned not to make herself at home in a home that wasn’t hers&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;&lt;font color="#099AC6"&gt;&lt;strong&gt;The Bears Results:&lt;/strong&gt;&lt;/font&gt;&lt;br&gt;
&lt;strong&gt;How did they use their collected data?&lt;/strong&gt; To find the culprit who vandalized their home&lt;br&gt;
&lt;strong&gt;What innovation did they achieve?&lt;/strong&gt; They discovered Goldilocks made a better meal than porridge and blueberries&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;Okay, that last conclusion is pure speculation on my part, but you see what I’m getting at. Data analysis is rich inspiration for storytelling. You help your clients visualize their choices when you include storytelling in your design, development, and deliverable.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10551829</link>
      <guid>https://www.technologyfirst.org/Tech-News/10551829</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Tue, 25 May 2021 17:27:40 GMT</pubDate>
      <title>Good Data and Better Decisions</title>
      <description>&lt;p&gt;&lt;font color="#DD4A3A" style="font-size: 18px;"&gt;Kathy Vogler, Communications Manager, Expedient Technology Solutions&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;Early on in my career, I was told by a boss that my intuition was a gift and that I should always trust my guts in every decision I made.&amp;nbsp; That advice has really worked for me most of my life.&amp;nbsp; However, the new reality in a data-driven culture embraces the use of data in decision-making.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;“If we have data, let’s look at data.&amp;nbsp; If all we have are opinions, let’s go with mine.” ~ Jim Barksdale; President and CEO of Netscape 1995 - 1999&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;Maybe my mind captures, cleans and curates meaningful data.&amp;nbsp; But the volume of our organizational data is much more than my job or my thoughts.&amp;nbsp; Our culture is supported by data-driven decision making and the data holds our teams accountable.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;The literacy level of any team member to leverage the data at hand and turn that into appropriate decisions is key. Hence a systematic approach to analysis of the data and reporting that is understandable and actionable is of utmost importance.&amp;nbsp; The staggering amount of data that we store and analyse means that we need to meet often to review data findings, choosing what needs to be measured and what metrics will be implemented.&amp;nbsp; Our data wizards have created detailed metrics on our customers’ experience which helps our team deliver wow.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;No Departmental Silos Allowed&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;Departments tend to focus on the data that affects them directly, and rightfully so.&amp;nbsp; But this sometimes creates a logjam and we become ignorant to the language of data that is being interpreted by each team. If we tie every team in an explicit and quantitative level, it helps us to understand if we have enough data for a reliable model to make intelligent decisions.&amp;nbsp; We need to evaluate uncertainty by testing and reevaluating the data collectively. It’s been said that promising ideas greatly outnumber practical ideas.&amp;nbsp; Proof of concepts will determine if the idea is viable in production.&amp;nbsp; The immediate goals directly affect each team member by saving time and avoiding rework with readily accessible knowledge at their fingertips.&amp;nbsp; Metrics should be universal and each team should take ownership of interpreting their data to help the literacy of the enterprise.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;Measure what you Should, not what you Can&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;More data doesn’t guarantee better decisions, but it is always better to start with data.&amp;nbsp; Better decisions almost always begin with better informed teams.&amp;nbsp; And it’s our duty as team members to ask questions. And so I bring up skewed data …&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;&lt;sup&gt;&lt;font&gt;1&lt;/font&gt;&lt;/sup&gt; &lt;font&gt;Some distributions of data, such as the&amp;nbsp;&lt;/font&gt;&lt;a href="https://www.thoughtco.com/introduction-to-the-bell-curve-3126337" target="_blank"&gt;&lt;font&gt;&lt;font&gt;bell curve&lt;/font&gt;&lt;/font&gt;&lt;/a&gt;&lt;font&gt;&amp;nbsp;or&amp;nbsp;&lt;/font&gt;&lt;a href="https://www.thoughtco.com/what-is-normal-distribution-3026707" target="_blank"&gt;&lt;font&gt;&lt;font&gt;normal distribution&lt;/font&gt;&lt;/font&gt;&lt;/a&gt;&lt;font&gt;, are symmetric. This means that the right and the left of the distribution are perfect mirror images of one another. Not every distribution of data is symmetric. Sets of data that are not symmetric are said to be asymmetric. The measure of how asymmetric a distribution can be is called skewness.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;&lt;font&gt;The mean, median and mode are all&amp;nbsp;&lt;/font&gt;&lt;a href="https://www.thoughtco.com/the-mean-median-and-mode-2312604" target="_blank"&gt;&lt;font&gt;&lt;font&gt;measures of the center&lt;/font&gt;&lt;/font&gt;&lt;/a&gt;&lt;font&gt;&amp;nbsp;of a set of data. The skewness of the data can be determined by how these quantities are related to one another.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;&lt;font&gt;One measure of skewness, called Pearson’s first coefficient of skewness, is to subtract the mean from the mode, and then divide this difference by the&amp;nbsp;&lt;/font&gt;&lt;a href="https://www.thoughtco.com/calculate-a-sample-standard-deviation-3126345" target="_blank"&gt;&lt;font&gt;&lt;font&gt;standard deviation&lt;/font&gt;&lt;/font&gt;&lt;/a&gt;&lt;font&gt;&amp;nbsp;of the data. The reason for dividing the difference is so that we have a dimensionless quantity. This explains why data skewed to the right has positive skewness. If the data set is skewed to the right, the mean is greater than the mode, and so subtracting the mode from the mean gives a positive number. A similar argument explains why data skewed to the left has negative skewness.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;Pearson’s second coefficient of skewness is also used to measure the asymmetry of a data set. For this quantity, we subtract the mode from the median, multiply this number by three and then divide by the standard deviation.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/Kathy%20pic.png" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;&amp;nbsp; &amp;nbsp;X = mean value&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&amp;nbsp; &amp;nbsp;M&lt;sub&gt;o&lt;/sub&gt; = mode value&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;&amp;nbsp; &amp;nbsp;S = standard deviation of the sample data&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;Skewed data arises quite naturally in various situations. Incomes are skewed to the right because even just a few individuals who earn millions of dollars can greatly affect the mean, and there are no negative incomes. Similarly, data involving the lifetime of a product, such as a brand of light bulb, are skewed to the right. Here the smallest that a lifetime can be is zero, and long-lasting light bulbs will impart a positive skewness to the data.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 12px;"&gt;&lt;sup style=""&gt;&lt;span style="background-color: white;"&gt;&lt;font style=""&gt;1&lt;/font&gt;&lt;/span&gt;&lt;/sup&gt; &lt;span style="background-color: white;"&gt;&lt;font style=""&gt;Taylor, Courtney. "What Is Skewness in Statistics?" ThoughtCo, Aug. 25, 2020, thoughtco.com/what-is-skewness-in-statistics-3126242.&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;It’s important to take note of skewness while assessing your data since extreme data points are being considered. Take into consideration the extremes for current logic instead of focusing only on the average which provides a better picture of the future logic.&amp;nbsp; Flawed data analysis leads to flawed conclusions which often result in poor business decisions.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;I do trust my instincts, but my reporting to others is much better with statistical data.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10551791</link>
      <guid>https://www.technologyfirst.org/Tech-News/10551791</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Tue, 25 May 2021 17:17:21 GMT</pubDate>
      <title>Telehealth and the Edge: Infrastructure Considerations for Remote Patient Care</title>
      <description>&lt;p&gt;&lt;font face="Verdana" color="#DD4A3A"&gt;Uptime Solutions &amp;amp; Vertiv&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#333333" face="Verdana"&gt;&lt;strong&gt;It’s not an exaggeration to say the global pandemic created a new healthcare delivery model virtually overnight. Telehealth, previously a simmering patient engagement option, has now erupted.&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#333333" face="Verdana"&gt;The global telehealth market is expected to grow dramatically, reaching $266.8 billion by 2026 and showing a compound annual growth rate (CAGR) of 23.4% between 2018 and 2026. The biggest barrier to pre-pandemic adoption was behavioral inertia. Now due to COVID-19, momentum is building toward a marked transformation.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#333333" face="Verdana"&gt;Understandably, most healthcare providers are struggling to keep pace. Existing IT systems, infrastructure, and security and privacy protocols already were stretched or outdated due to the proliferation of diversified healthcare systems. Telehealth adds another layer of complexity requiring new IT strategies and investments.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#333333" face="Verdana"&gt;Read our white paper to learn more about the critical decisions that are looming for healthcare IT managers and chief information officers (CIOs).&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.vertiv.com/en-us/about/news-and-insights/articles/white-papers/telehealth-and-the-edge-infrastructure-considerations-for-remote-patient-care/?utm_source=eloqua&amp;amp;utm_medium=email&amp;amp;utm_campaign=architects-of-continuity&amp;amp;utm_term=branding_critical-link-april&amp;amp;utm_content=en_article_white-paper" target="_blank"&gt;&lt;font color="#333333" face="Verdana"&gt;Download the White Paper at the Vertiv Blog&lt;/font&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10551735</link>
      <guid>https://www.technologyfirst.org/Tech-News/10551735</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Tue, 25 May 2021 17:08:53 GMT</pubDate>
      <title>Next TechCred Round Launches June 1st</title>
      <description>&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;" color="#DD4A3A"&gt;Governor's Office of Workforce Transformation&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;font&gt;The next round of TechCred opens on &lt;strong&gt;June 1&lt;sup&gt;st&lt;/sup&gt; and closes on June 30&lt;sup&gt;th&lt;/sup&gt; at 3:00 p.m&lt;/strong&gt;.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;font&gt;Ohio businesses can visit&lt;/font&gt; &lt;a href="https://gcc02.safelinks.protection.outlook.com/?url=http%3A%2F%2Ftechcred.ohio.gov%2F&amp;amp;data=04%7C01%7Cjulia.poling%40owt.ohio.gov%7C00c4d83deba64d58a6a408d91eda490a%7C50f8fcc494d84f0784eb36ed57c7c8a2%7C0%7C0%7C637574745149127390%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;amp;sdata=82PZQmyeM1zAh4dATNiIG35HXZTC8QVGh%2FSvsb2Neh4%3D&amp;amp;reserved=0" target="_blank"&gt;&lt;strong&gt;&lt;font&gt;TechCred.Ohio.gov&lt;/font&gt;&lt;/strong&gt;&lt;/a&gt; &lt;font&gt;to apply and help their employees earn a short-term, technology-focused credential at no cost. Not only can businesses upskill their current employees, but they can upskill those they plan to hire as long as they are on the payroll at the time of reimbursement.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;More than 1,100 Ohio businesses have used TechCred, some having used it multiple times, creating the opportunity for 19,841 technology-focused credentials to be earned by Ohio employees.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;The results from the April application period will be announced in the near future.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=""&gt;Visit&lt;/span&gt; &lt;a href="https://techcred.ohio.gov/wps/portal/gov/techcred" target="_blank"&gt;TechCred.Ohio.gov&lt;/a&gt; &lt;span style=""&gt;to learn more!&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=""&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/Ohio%20Husted%20Banner.png" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10551697</link>
      <guid>https://www.technologyfirst.org/Tech-News/10551697</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Fri, 21 May 2021 14:36:42 GMT</pubDate>
      <title>Raise your IT Department to the Next Level!</title>
      <description>&lt;p&gt;&lt;span&gt;&lt;font face="Verdana" style="font-size: 18px;" color="#DD4A3A"&gt;Info-Tech Research Partnership&lt;/font&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#000000" face="Verdana" style="font-size: 18px;"&gt;To provide additional resources for our members, we have formed a new Partnership with Info-Tech Research Group.&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;font color="#000000"&gt;Through this relationship,&lt;/font&gt; &lt;font color="#000000"&gt;Info-Tech is offering our community complimentary access to specific research and services across a wide range of topics as an additional benefit to members across the Technology First community.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Verdana" style="font-size: 18px;"&gt;Ensure your IT team delivers measurable results for your organization while networking with a community of peers and access these benefits through Technology First today!&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;" color="#099AC6"&gt;&lt;em&gt;If you are a member, be sure to log in and visit the Tech First Member forum under our Peer Groups tab to receive your complimentary resources!!&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/ITRG%20May%202021.png" alt="" title="" border="0" width="624" height="800"&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10529750</link>
      <guid>https://www.technologyfirst.org/Tech-News/10529750</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Wed, 12 May 2021 16:48:44 GMT</pubDate>
      <title>Host a 5-day Mini Internship! Support aspiring IT Professionals!</title>
      <description>&lt;p&gt;&lt;font color="#DD4A3A"&gt;WANTED: Area organizations to host a student for 1 week!&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="http://www.lbtbyec.org" target="_blank"&gt;Back to Basics Youth Education Center&lt;/a&gt; is a free non-profit after school program that focuses on coding and programming in the Dayton area.&lt;/p&gt;

&lt;p&gt;This summer, they are holding a 4-week summer program for 5 students in the area. Two of the weeks they are wanting to set up&amp;nbsp; 5-day mini internships with local IT organizations!&amp;nbsp;&lt;strong&gt;&lt;em&gt;Would you be willing to sponsor a student for a week?&amp;nbsp;&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;Please contact:&lt;strong style="font-style: italic;"&gt;&amp;nbsp;&lt;/strong&gt;&lt;/span&gt;Lawrence Lindsey,&amp;nbsp;&lt;em&gt;Director,&amp;nbsp;&lt;/em&gt;&lt;em&gt;Back to Basics Youth Education Center&lt;/em&gt; at&lt;font style="font-size: 18px;"&gt;&amp;nbsp;&lt;a href="mailto:lbtbyec@gmail.com" style="" target="_blank"&gt;&lt;font face="Calibri, sans-serif"&gt;lbtbyec@gmail.com&lt;/font&gt;&lt;/a&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p align="center"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/Give%20Back.png" alt="" title="" border="0" width="388" height="218"&gt;&lt;br&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10551603</link>
      <guid>https://www.technologyfirst.org/Tech-News/10551603</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Mon, 03 May 2021 18:29:28 GMT</pubDate>
      <title>A Healthy Culture is not an Accident</title>
      <description>&lt;p&gt;&lt;font color="#DD4A3A"&gt;Kathy Vogler, Communications Manager, Expedient Technology Solutions&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;Every employee affects your organization. The executive leadership team may have the most direct impact on your company culture, but any employee who “leads” can too.&amp;nbsp; While culture revolves around the engagement, environment, atmosphere and success of the company; leadership affects staff confidence and self-worth.&amp;nbsp; Leaders at every level have a responsibility to “be the change you want to see” and to demonstrate the company values in their actions.&amp;nbsp; Technology connects us in increasingly new ways that place a bigger social responsibility on our companies.&lt;/p&gt;

&lt;p&gt;If you have a great culture, guard it as the precious foundation of your success.&amp;nbsp; You must hire people who fit your culture.&amp;nbsp; If your employee represents your company through account management, sales, marketing, support staff or even avenues outside of work; you’ll want to make sure that first impression is an accurate and favorable reflection of your company. &amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why do you want to work here?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This is a common HR question and a great way to know that the prospective employee has done research on your company and the position. Are they onboard with your values? Do they live your values in their personal life? No one is perfect, but you’ll want to watch for dysfunction, passive-aggressive behavior and the dreaded sociopath.&amp;nbsp; HR and hiring managers will need to look past the surface and see the real person. Some people are fantastic at interviews and can hide their true selves. &amp;nbsp;A deceptive bad hire may slip through and will be very hard on team members and your culture even if they don’t make it to their 90-day review.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;We’ve all witnessed that high-performing employee who didn’t fit the culture, often called “cultural vampires.” Even with solid performance, their attitude will be detrimental to the company culture. Maybe you’ve lived the “people don’t leave a company they leave a bad boss” meme. I have. And I felt forced to leave a job I loved and people I respected.&amp;nbsp; A bad boss is hard on the culture.&amp;nbsp; HR may want to look for signs to see if that polished, charming, capable person you are interviewing may be a toxic nightmare for your staff and culture.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;A strong culture is distinguished by firmly held core values that are organized, openly shared and permeate throughout the entire staff. Employees will thrive when they know their leaders personally care about their well-being.&amp;nbsp; The five aspects of well-being include physical, social, community, financial and purpose.&amp;nbsp; Focusing on only one or two aspects will miss important opportunities to grow the best workplace culture. Quality leaders demonstrate a genuine interest in promoting the growth of their employees and will collaborate to build career paths and provide the resources needed.&amp;nbsp; By encouraging employees to take risks in order to grow, effective leaders are able to foster a culture of learning and growth.&amp;nbsp; Good leaders incentivize hard work and good behavior, and they promote a vision of the future that is positive and values-based. Strong leadership knows that good ideas and good decisions can come from anywhere.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;People are all different, but you need that.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Most companies use some form of personality tests prior to hiring and there are plenty to choose from. Hippocrates suggested that humans had a “persona” in 460 BC and the rise in psychodynamics in the 1800s led to a drastic change in the way we viewed and understood personality in social situations.&amp;nbsp; Sigmund Freud suggested that our behavior and personality are driven by our innate desires and needs.&amp;nbsp; Carl Jung proposed there are four human personality influences: sensing and intuition (irrational or perceiving functions) and thinking and feeling (rational or judging functions).&amp;nbsp; This spurred the popular Myers-Briggs testing. &amp;nbsp;New hire assessments come in many forms and people are pretty used to doing skills assessments, personality quizzes and IQ testing as part of the hiring process.&lt;/p&gt;

&lt;p&gt;Those of us who are Technology First Women 4 Technology (W4T) members have had the great opportunity to delve into the importance of creating teams and groups inside of our organizations that encompass all personality types.&amp;nbsp; In 2017 we walked through our DISC (Dominance, Inducement, Submission and Compliance) profiles and in 2021 we virtually worked through our Clifton Strengths self-assessments.&amp;nbsp; I walked away from these meetings with a better understanding of my own strengths, the strengths of my peers and that each personality type requires unique communications.&amp;nbsp; In our differences, we are a stronger team.&lt;/p&gt;

&lt;p&gt;The DISC session was focused on building effective teams using complementary styles.&amp;nbsp; You probably get along great with some people and others take all of your energy and patience.&amp;nbsp; In this analysis, all four personalities have a style that determines the way we approach our work and life and defines how we will react to situations and other people.&amp;nbsp; This program is a great way to identify your style and what to look for in others to build highly effective teams.&amp;nbsp; Those teams need to have an even number of people of each type and not be dominated by one certain personality characteristic.&lt;/p&gt;

&lt;p&gt;We use this program at work through Innermetrix values with Dave Ramsey’s goal tactics as part of our hiring process and openly share our profiles with the team. I was surprised to see how different my “adaptive” style is from my “natural” style, which I attribute to a large family and strict parents.&amp;nbsp; You can see by my chart that “C” (compliance or caution) goes from 39 natural to 60 adaptive. &amp;nbsp;Whew!&lt;/p&gt;

&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/kathy%201.jpg" alt="" title="" border="0"&gt;&lt;br&gt;
You can use the complete executive summary to understand how employees will approach solving problems, interacting with team members, environmental preferences, expectations and their approach to the pace of their work.&amp;nbsp; Additionally, the results will offer opportunities for developmental growth, motivation, learning styles and communication insights.&amp;nbsp; There is a &lt;a href="https://discpersonalitytesting.com/" target="_blank"&gt;free assessment&lt;/a&gt;, or you can complete the full assessment for $29 per employee.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Focus on strengths and not on your weaknesses.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Clifton Strengths from Gallup breaks talents (strengths) down to 34 themes that fall into 4 different domains (Executing, Influencing, Relationship Building and Strategic Thinking).&amp;nbsp; We are born with innate talents or gifts.&amp;nbsp; The Clifton Strengths Test method, introduced in 2001 by Gallup and created by Don Clifton, concludes that a person experiences more success and satisfaction when they can use their talents in their daily activities.&amp;nbsp; According to Gallup, a focus on weaknesses does nothing to help development, but a focus on strengths will allow you to succeed and continue in situations that others have decided are impossible or extremely difficult. When we create teams with a variety of strengths, the number of tools and talents they have access to increases exponentially.&lt;/p&gt;

&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/kathy%202.jpg" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/p&gt;

&lt;p&gt;Of course, completely ignoring weaknesses is not an option.&amp;nbsp; It is healthy to identify the cause of the weakness (education, experience or opportunity) and there is almost always something that can be done about it.&amp;nbsp; StrengthsFinder 2.0 ISBN 978-1-59562-015-6 can be purchased anywhere, I bought mine on Amazon for $17.&amp;nbsp; Each book contains a unique code to take the CliftonStrengths Assessment online.&amp;nbsp; The personality test consists of 177 questions and each should be answered within 20 seconds. The entire test usually takes around 30 minutes.&amp;nbsp; A report is generated based on the answers and clarifies the five strongest themes and summarizes a strengths insight guide.&lt;/p&gt;

&lt;p&gt;You cannot change your basic personality type. However, you can, and should, change the aspects of your personality that you are unhappy with to become a more well-rounded person.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Are technical people introverts and sales people extroverts?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;2014 was declared the year of the “Introvert Craze” mainly due to the influx of technology in our daily lives and the rapid rise of social media channels. The terms introvert and extrovert are consistently misunderstood and usually show two polarized personalities – the extremely shy and the extremely confident.&amp;nbsp; The truth is that introverts can be as social as extroverts, but when their batteries are drained, they need solitary downtime.&amp;nbsp; Extroverts, on the other hand, need people to recharge their batteries.&amp;nbsp; 2020 memes often showed introverts claiming to have prepped their whole life for the solitude of the pandemic.&amp;nbsp; Has social media given a voice to introverts?&amp;nbsp; Face-to-face socialization gears us for talking while the qualities of listening and thinking are largely ignored.&amp;nbsp; Unfortunately, we may have taken that same thought into social channels too.&lt;/p&gt;

&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/kathy%203.jpg" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/p&gt;

&lt;p&gt;The stereotype of tech people being introverts is mostly false.&amp;nbsp; Highly technical people tend to be more capable of being quiet and focused on what they are doing and are proficient at working alone. You won’t get very far in technology without this natural behavior.&amp;nbsp; However, it’s unfair to perceive the extreme when most people are adept at crossing directions and socially adapted and able to handle human interactions.&amp;nbsp; The perfect example of each extreme are the rivals Thomas Edison (extrovert) and Nikola Tesla (introvert).&amp;nbsp; Where would we be without either of those?&amp;nbsp; I believe I am an Ambivert.&amp;nbsp; Anyone who has met me knows I love people and talk to everyone, but what you don’t see is when I’m drained of energy that I prefer to be alone to recharge.&amp;nbsp; I think this is much more common than either of the extremes.&lt;/p&gt;

&lt;p&gt;“Company culture is what employees live and breathe every day in the workplace.” ~ Mike Zani, The Predictive Index&lt;/p&gt;

&lt;p&gt;Diversity and inclusivity at every level of your organization brings many benefits to your company and to your individual team members.&amp;nbsp; It is important to create a culture where all people feel included and represented -- every department, every team, every project.&amp;nbsp; You must first understand the true personalities of your team members then work to utilize their skills collectively.&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10404398</link>
      <guid>https://www.technologyfirst.org/Tech-News/10404398</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Mon, 03 May 2021 18:22:17 GMT</pubDate>
      <title>Technology Leadership &amp; Culture</title>
      <description>&lt;p align="left"&gt;&lt;font style="font-size: 18px;"&gt;&lt;span&gt;&lt;font color="#DD4A3A" style=""&gt;Jim Bradley, VP IT, Tecomet &amp;amp; Technology First Board, Past Chair&lt;/font&gt;&lt;/span&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;So, what has it been like being a technology leader during these unprecedented times over the past year? &amp;nbsp;And how has the technology culture changed in the new normal virtual world?&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 18px;"&gt;Technology Leadership&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;Being a technology leader during the past year has been truly challenging.&amp;nbsp; &amp;nbsp;For many of us, traveling has gone from regular to non-existent, whether that be local, regional, national, or global.&amp;nbsp; This has freed up a significant amount of time which was subsequently and rapidly filled with on-going remote video meetings, typically supported by more presentations.&amp;nbsp; Also, most of us are working longer hours without our usual commutes, both earlier in the morning and longer into the evenings and weekends.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;Many of us depended on personal face-to-face interactions with our customers, our team and our partners and suppliers.&amp;nbsp; We never thought it could or would work without that, but it has.&amp;nbsp; It is less personal for sure, without the ability to see full body language, having some of the interpersonal chats before or after the meetings, or the always valuable informal hallway chats or those during travel, meals, and drinks.&amp;nbsp; We’ve had to compensate and communicate in other ways.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;Our first thoughts were around the bandwidth for work from home, having enough computers, peripherals and accessories, cybersecurity, and personal home wi-fi and internet.&amp;nbsp; Many of these concerns were easier to overcome than initially anticipated.&amp;nbsp; One of the items we had to address quickly were electronic signatures, which also became easier than originally thought.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;What about Vision and Innovation?&amp;nbsp; Technology has received more respect over the past year; everyone began to see their own dependencies for sufficient and better technology.&amp;nbsp; On top of that, there was now more interest in how technology could help organizations more, adding to what was the technology vision and innovative solutions for many Executive Teams and Boards.&amp;nbsp; What else could we do for mobility, agility, productivity, and efficiency now that it was in the spotlight?&amp;nbsp; It was good for us to have more of a say at the table and to bring forth what else could be done.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 18px;"&gt;Technology Culture&amp;nbsp;&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;As for the technology culture, changes in the new normal virtual world have been dramatic. &amp;nbsp;Technology influences our everyday lives and has a strong influence on culture.&amp;nbsp; It impacts the ways in which we do most anything; personal computers, mobile smartphones, tablets, e-mail, the internet, social media - how did we ever survive without these things before we had them?&amp;nbsp; They have changed the way we communicate, learn, think, and how we interact on daily basis.&amp;nbsp; We are more interactive and collaborative than ever before.&amp;nbsp; But do these items also lead to addiction, psychological, or physical health issues?&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;&lt;font&gt;Promoting technological understanding at a user level occurred as many, both in the professional and personal world, have become much more computer savvy, leading us to the point that we are all likely much more efficient…or are we?&amp;nbsp; While we think we are, what overall psychological or physical health detriments have we ignored?&amp;nbsp; How are we working harder and longer than ever before while remaining isolated from each other, unable to socially interact as we used to?&amp;nbsp; And how are we physically? Are we still getting as much exercise and/or are we eating better in a more sedentary world?&amp;nbsp; I would argue both worse and better depending on the individual.&amp;nbsp; Have you rebalanced your eating, drinking, and exercise habits to remain healthy while working longer, and more stationary, hours?&amp;nbsp;&lt;/font&gt;&lt;font face="Verdana"&gt;&lt;font&gt;I’ve seen many more people standing at their desks all day to compensate.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; &lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;Information Exchange occurs predominantly via remote video meetings, as well as over the phone.&amp;nbsp; Is that as productive as a face-to-face meeting?&amp;nbsp; I say not, but I also see it working for some individuals.&amp;nbsp; But are we making tasks easier and solving problems this way?&amp;nbsp; I believe we are, there is more automation, less downtime, and we are still getting our jobs done.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;"&gt;What do you think?&amp;nbsp; My goal was to get you to consider all the pros and cons we’ve experienced in these past few months and truly think about it.&amp;nbsp; What would you like to change now, and what would you like to keep?&amp;nbsp; &amp;nbsp;While we’ve still got a long way to go, keep your chin up and do what you can! Good luck!&lt;/font&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10373555</link>
      <guid>https://www.technologyfirst.org/Tech-News/10373555</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Mon, 03 May 2021 18:19:19 GMT</pubDate>
      <title>Boundaries Battle Burnout</title>
      <description>&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;" color="#DD4A3A"&gt;&lt;span&gt;Mardi Humphreys, Change Agent, Integration Edge&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;font&gt;The World Health Organization recognizes burnout as an official medical&lt;/font&gt; &lt;a href="https://technologyfirst.sharepoint.com/sites/TechnologyFirst2/Shared%20Documents/General/Magazine-Newsletter/Issues%20-%202021/05%20-%20MAY/(https:/icd.who.int/browse11/l-m/en#/http://id.who.int/icd/entity/129180281" target="_blank"&gt;&lt;font&gt;diagnosis&lt;/font&gt;&lt;/a&gt; &lt;font&gt;caused by an unrelenting workload&lt;/font&gt; &lt;font&gt;and/or&lt;/font&gt; &lt;font&gt;no work-life balance. It’s number two on this&lt;/font&gt; &lt;a href="https://wiw-report.s3.amazonaws.com/Women_in_the_Workplace_2020.pdf" target="_blank"&gt;&lt;font&gt;list&lt;/font&gt;&lt;/a&gt; &lt;font&gt;of what employees said were their biggest challenges during the pandemic.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;strong&gt;They feel&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;font&gt;·&lt;font&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/font&gt; &lt;font&gt;pressured to be available 24/7/365&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;font&gt;·&lt;font&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/font&gt; &lt;font&gt;lack of flexibility at work&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;font&gt;·&lt;font&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/font&gt; &lt;font&gt;worried about losing their jobs&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;font&gt;·&lt;font&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/font&gt; &lt;font&gt;overwhelmed dealing with shuttered daycare and online school&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;font&gt;·&lt;font&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/font&gt; &lt;font&gt;not at liberty to talk about outside-of-work issues affecting job performance&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;To begin battling burnout, define, set, and enforce your personal boundaries with your manager.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;strong&gt;Define&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Your boundaries are based on your values and priorities. When defining them, think about what you need to feel empowered. The last time you felt undervalued, disrespected, or out of balance, what was the trigger? Did you have to work last weekend? Do you buy the office birthday cards and cupcakes for coworkers and it’s not in your job description? That’s where your boundary is. If you could live that situation over again, what action would you take to change it?&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;strong&gt;Set&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;font&gt;·&lt;font&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/font&gt; &lt;font&gt;Does your manager randomly call you throughout the week? Schedule a recurring 1:1 catch up meeting with an agenda.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;font&gt;·&lt;font&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/font&gt; &lt;font&gt;Feeling overwhelmed? Make a list of your priorities and ask your manager to do the same. In your next 1:1, compare lists. Are they different? Decide together what your top three responsibilities are and how much freedom you have to accomplish them.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;font&gt;·&lt;font&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/font&gt; &lt;font&gt;If your manager’s expectations cross a boundary, how important is the boundary to you? Is a compromise possible? Is saying no a battle you want to fight?&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;font&gt;·&lt;font&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/font&gt; &lt;font&gt;Give updates on your projects’ statuses and request they prioritize them. Ask them to tell you more about why they need this assignment done in this timeframe, and why the task requires your unique skillset.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;font&gt;·&lt;font&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/font&gt; &lt;font&gt;Personal goals count. If your manager wants you to stay late, but your trainer is meeting you at the gym at 6:00PM, offer to get started early tomorrow morning. Compromise so you aren’t saying no all the time.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;font&gt;·&lt;font&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/font&gt; &lt;font&gt;Best practice is setting boundaries at the beginning of a project. For example: Make a rule to only answer texts after 7PM if it’s an emergency, and define what constitutes an emergency.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;font&gt;·&lt;font&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/font&gt; &lt;font&gt;Use technology to help you communicate boundaries: change your status to busy in the business communication platform your company uses, calendar an hour a day and label it as busy. You don’t have to say what you’re using the time for. Get the kids started on their homework if that’s what it takes to enable you to finish your work.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Burnout doesn’t just affect you; it affects the work too. You need to be flexible and accommodate the occasional emergency requiring overtime. But, regular work hours and exceeding the expectations of the project are good boundaries to help you both do the work every day and juggle the other aspects of your life. Do not apologize for protecting the time it takes to do the work you are already assigned.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;strong&gt;Enforce&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;font&gt;Practice for boundary crossers. Rehearsal takes the emotion out of holding your boundary. Visualize y&lt;/font&gt;&lt;font&gt;our manager&lt;/font&gt; &lt;font&gt;asking you to work on a Sunday morning; what do you do?&lt;/font&gt; &lt;font&gt;Instead of silently fuming&lt;/font&gt; &lt;font&gt;over the&lt;/font&gt; &lt;a href="https://mardihumphreys.com/stalled-boundary/" target="_blank"&gt;&lt;font&gt;infraction&lt;/font&gt;&lt;/a&gt; &lt;font&gt;for hours,&lt;/font&gt; &lt;font&gt;i&lt;/font&gt;&lt;font&gt;mmediately reinforce your boundary by clearly and respectfully stating what it is and why it exists. Be consistent in holding healthy boundaries. You aren’t communicating clearly if you keep moving them.&lt;/font&gt; &lt;font&gt;For example,&lt;/font&gt; &lt;font&gt;i&lt;/font&gt;&lt;font&gt;f you said you won’t respond to emails after 7:00PM, don’t open your inbox.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Your boundaries will be challenged. That will reveal where they are and help you to refine and iterate them. Those who set and hold boundaries gain respect. A friend just gave up a committee chair position because she assessed her commitments and realized she needed to off-load some. Will I miss her leadership? Yes. Do I respect her for making choices that help her achieve her goals? Absolutely.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Headshots/Mardi%20Humphreys%20circle.png" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10404288</link>
      <guid>https://www.technologyfirst.org/Tech-News/10404288</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Thu, 29 Apr 2021 18:45:43 GMT</pubDate>
      <title>Leadership &amp; Culture Videos with The Geek &amp; The Coach</title>
      <description>&lt;p&gt;&lt;font color="#DD4A3A"&gt;Jeff Van Fleet "The Geek" &amp;amp; Mark Adams "The Coach",&amp;nbsp;Lighthouse Technologies&lt;/font&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href="https://youtu.be/v2sPkUHGhSU" target="_blank"&gt;What does it mean to have a can-do attitude?&lt;/a&gt;&lt;/li&gt;

  &lt;li&gt;&lt;a href="https://youtu.be/260_uIndVg0" target="_blank"&gt;Honestly and Culture&lt;/a&gt;&lt;/li&gt;

  &lt;li&gt;&lt;a href="https://youtu.be/yrJYRga8NEw" target="_blank"&gt;People, Processes, and Tools: How do you prioritize?&amp;nbsp;&lt;/a&gt;&lt;/li&gt;

  &lt;li&gt;&lt;a href="https://youtu.be/u66sxl0tOoY" target="_blank"&gt;Balancing Work and Life&lt;/a&gt;&lt;/li&gt;

  &lt;li&gt;&lt;a href="https://youtu.be/34l4ToEFVDU" target="_blank"&gt;Why asking Why is Important&lt;/a&gt;&lt;/li&gt;

  &lt;li&gt;&lt;a href="https://youtu.be/BQtmE79Qd3g" target="_blank"&gt;Mark Adams on Being Called a Fraud&lt;/a&gt;&lt;/li&gt;

  &lt;li&gt;&lt;a href="https://youtu.be/2j3d0U1GIOI" target="_blank"&gt;What does it mean to Have a Culture of We?&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10404593</link>
      <guid>https://www.technologyfirst.org/Tech-News/10404593</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Thu, 29 Apr 2021 18:37:20 GMT</pubDate>
      <title>IT Leader Spotlight: Paul Webendorfer</title>
      <description>&lt;p&gt;&lt;span style=""&gt;&lt;font color="#DD4A3A"&gt;Paul Webendorfer, Director of IT, ChangeUp Inc.&lt;/font&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=""&gt;&lt;font color="#DD4A3A"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Headshots/Paul%20Webendorfer%20circle.png" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/font&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=""&gt;&lt;strong&gt;Did you always want to work in IT?&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;As far as career paths go, I am still weighing my options. I sincerely hope to make a decision before retirement, but the clock is ticking. Despite the fact that I have been working in IT for nearly 25 years, I had no aspirations of working in IT. I was actually planning for a career in financial law. Somewhere along the way, I took a job with a small local company, started helping with the fledgling IT department and the rest is history. Maybe I didn’t know what I really wanted to do or maybe it was just fate. Either way, I am blessed to have accidentally found a career that has provided me with so many challenges, so many rewards and so many opportunities to work with amazing people.&lt;/p&gt;&lt;span style=""&gt;&lt;strong&gt;What’s the best career advice you ever received?&lt;/strong&gt;&lt;/span&gt;&lt;br&gt;

&lt;p&gt;Throughout my career, my managers have primarily been on the business side of the organization, rather than the IT side of the organization. I think this factor helped form my “business first” IT philosophy. As a young man, just learning about business technology, enamored by technical bells and whistles, my boss gave me some excellent advice. He told me, “technology doesn’t mean a thing to us, if it doesn’t help the business.” This simple, practical advice set me on the right path of focusing on business solutions and not on the technology itself. To this day, I consider myself a business person working in IT, not an IT person working in business… and that has made a big difference for me.&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10404471</link>
      <guid>https://www.technologyfirst.org/Tech-News/10404471</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Thu, 29 Apr 2021 18:32:48 GMT</pubDate>
      <title>The Hub Powered by PNC &amp; Vincent Lewis</title>
      <description>&lt;p&gt;&lt;font color="#DD4A3A"&gt;Staff Writer&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;Technology First had an opportunity to sit down, virtually of course, with Vincent Lewis, President of The Hub Powered by PNC, which is an exciting new joint venture here in Dayton. Given the April theme is building an innovation culture within our companies or individual teams, we thought getting a better understanding of this new organization’s mission and leader would be interesting to our 175 member companies.&lt;/p&gt;

&lt;p&gt;With over 95,000 square feet of unique space, The Hub sits in the heart of downtown Dayton and is breathing new life into the city as well as a historic landmark building that was built in 1906 and previously called Dayton Arcade. If you have not seen it yet, there is a great YouTube video called “The Dayton Arcade: Waking the Giant” we would personally recommend watching to get a little better understanding of the space The Hub and its development partners are helping to reclaim.&lt;/p&gt;

&lt;p&gt;The joint venture itself, which is between The Entrepreneurs Center and The University of Dayton, is designed to help drive forward new venture creation and social innovation and will also serve as the centralized location for the region’s entrepreneurs and innovators. An important part of that venture will be the team of organizations behind it which includes not only the University of Dayton, but the L. William Crotty Center for Entrepreneurial Leadership program, which will be housed at The Hub, The Greater West Dayton Incubator, numerous Dayton-based startups, and the Entrepreneur Center. This team and the venture are designed to build out a critical and needed focal point of the activity that physically and programmatically will merge two of the region’s primary entrepreneur-oriented organizations. This space will allow the free flow of ideas and help facilitate what they call “serendipitous collisions” among innovative thinkers while offering practical, flexible, and cost-effective space solutions for entrepreneurs.&lt;/p&gt;

&lt;p&gt;At the heart of this effort are Vincent Lewis and a strong team of individuals who will be focused on driving both a cultural as well as a business impact. The Cultural Impact is focused on partnering with the City of Dayton to ensure the resources, talent, and capital available within The Hub can also positively impact the broader Dayton community. The Greater West Dayton Incubator is a good example of one of the partners tasked to ensure pathways are opened to the opportunities in our startup ecosystem for minority and women entrepreneurs in underserved areas.&lt;/p&gt;

&lt;p&gt;No less important will be the business impact The Hub has been tasked to accelerate. Primarily this impact will be focused on the opportunities for innovators and entrepreneurs to launch their ideas, grow their businesses, and drive prosperity within the startup ecosystem. The Entrepreneur Center itself has served as a tremendous advocate and supporter of entrepreneurs in the Miami Valley for years including small businesses, high-tech, and research commercialization-focused startups. Specifically, one of the Entrepreneur Center’s tasks will be continuing to provide support through its mentorship, funding, and marketing programs at The Hub.&lt;/p&gt;

&lt;p&gt;Based on Dayton’s heritage of innovation, strong work ethic, and existing business community, it presents a real possibility to create hundreds of new jobs and ripple across all segments of the business community.&lt;/p&gt;

&lt;p&gt;For more information about ways to engage with The Hub Powered by PNC Bank, visit https://www.thehubdayton.com.&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 15px;" face="Arial, sans-serif"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/hub%201.jpg" alt="" title="" border="0"&gt;&amp;nbsp;&lt;/font&gt;&lt;/p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/hub%202.jpg" alt="" title="" border="0"&gt;

&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/hub%203.jpg" alt="" title="" border="0"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/hub%204.jpg" alt="" title="" border="0"&gt;&amp;nbsp;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/vincent%20hub.jpg" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/p&gt;

&lt;p&gt;In our time with Vincent, we had the opportunity to get to know him and asked him to share some personal things about himself and at the end of the conversation ways the Technology First Membership could collaborate with his team.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What needs do you believe the Hub addresses in the region?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The Hub meets many needs, but simply it will serve as a “Melting Pot” of opportunity and hands-on activities for a wide segment of our city, from the students and business owners who will occupy the 95,000 square feet of space to the citizens and investors looking for creative inventors, business owners, and other resources in our region.&amp;nbsp; This is also a great resource to give students the opportunity to remain in the region after graduation.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What’s a lesson you can share that's shaped your work?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Humility and learning you do not have all the answers and are not required to have all the answers to be successful were important lessons.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What’s a trend in technology or innovation that you think maybe doesn’t get enough attention?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I believe innovation is an overused word and there is not a straight line between technology and innovation. The Arcade serves as a great example of that. The origin story of the Arcade involves food wagons needing to get out of the rain so they started pulling into the building to better sell their products. It took many years and pivots to come to the current innovation and believe real innovation can take time.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Do you have a personal favorite place in the region you like to visit?&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;With a smile, “The Arcade”. Vincent has always enjoyed the 360 miles of regional bike trails in the Dayton region and two of his favorite locations are Charleston Falls in Tipp City and Sugarcreek Metropark south of Bellbrook.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Anything in closing you like to share with the Technology First Membership and overall technology community?&lt;/strong&gt; &amp;nbsp;&lt;/p&gt;

&lt;p&gt;I believe the Technology Community is an important piece of critical infrastructure to any region and it’s extremely important that we continue to grow it here in Dayton. Having technology-focused companies such as DataYard support our launch is only one example of how we can continue to collaborate.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Professional background&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A Western Kentucky graduate, Vincent went on to get his Master’s degree at Antioch University. After graduation, he went on to become the CEO of Hyde Park Electronics, a family-owned business at the time that would go on to become the #1 provider in the world (in front of companies such as Siemens) as a high-tech provider of ultra-sonic sensors technology. Over his 11 year career, he would lead the company on to eventually be sold to Schneider Electric. He would continue until leaving the company in 2007. He then went on to own Logos@Work,&amp;nbsp; with his wife for fourteen years, where he continues as chairman today. Finally, in 2014 he followed his love of teaching to his current role at The University of Dayton.&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10404439</link>
      <guid>https://www.technologyfirst.org/Tech-News/10404439</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Thu, 29 Apr 2021 18:21:14 GMT</pubDate>
      <title>IT Leader Spotlight: Jon Rike</title>
      <description>&lt;p&gt;&lt;font style="font-size: 18px;" color="#DD4A3A"&gt;&lt;span style=""&gt;Jon Rike, CIO, City of Dayton&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;" color="#DD4A3A"&gt;&lt;span style=""&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Headshots/Jon%20Rike%20circle.png" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" style="font-size: 18px;"&gt;&lt;strong&gt;What was your first Job?&amp;nbsp;&amp;nbsp;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" style="font-size: 18px;"&gt;My first job after graduating from college was providing IT support for executive leadership at the University of Dayton.&amp;nbsp; Looking back, I now realize how privileged I was to have access and exposure to phenomenal leaders like Brother Ray Fitz, Father Gene Contadino, Dr. Katy Marre, and Jaci Jackson.&amp;nbsp; &amp;nbsp;As I've grown in my career, I've more fully realized that my leadership style and approach to management was fundamentally shaped by these interactions and the lessons I learned from great leaders.&amp;nbsp; Throughout my career I've done my best to "pay it forward" by modeling their approach and continually looking for opportunities to provide servant leadership.&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" style="font-size: 18px;"&gt;&lt;strong&gt;What has been your greatest career achievement?&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" style="font-size: 18px;"&gt;Significant achievements in IT are typically associated with initiatives or projects that produce a fundamental impact at the enterprise level.&amp;nbsp; In my career I've been blessed to have led or contributed to many technology projects that have raised the bar and provided compelling benefits for the organization.&amp;nbsp; However, when I think of my greatest achievement I always come back to the team and the people.&amp;nbsp; As leaders we have an amazing opportunity to fundamentally change the trajectory of careers and lives.&amp;nbsp; My greatest achievement will always be associated with the investments I've made in my staff and the exponential growth that has followed!&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" style="font-size: 18px;"&gt;&lt;strong&gt;What's the best career advice you've ever received?&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" style="font-size: 18px;"&gt;One of the best pieces of career advice that I've ever received was provided in a quote by Harry Truman.&amp;nbsp; He famously said that "not all readers are leaders, but all leaders are readers".&amp;nbsp; This advice has really served me well in the area of information technology.&amp;nbsp; I truly believe that to successfully lead in this industry, you have to have an endless appetite for reading, learning, and growing.&amp;nbsp; Additionally, the pace of change within IT has accelerated to such a degree that any lapse in learning will quickly become a competitive disadvantage for the individual, the team, and the organization.&amp;nbsp; Thanks for the great advice President Truman!&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" style="font-size: 18px;"&gt;&lt;strong&gt;What advice would you give aspiring IT leaders?&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" style="font-size: 18px;"&gt;Enjoy the process of becoming! I think in life we often try to speed the process of reaching a given objective without fully embracing or appreciating the journey.&amp;nbsp; As Kobe Bryant said,&amp;nbsp;"Those times when you get up early... those times when you stay up late... when you're too tired... you don't want to push yourself, but you do it anyway.&amp;nbsp; &amp;nbsp;That is actually the dream."&amp;nbsp;&amp;nbsp;&lt;span style="background-color: white;"&gt;Enjoy the ride, be a voracious reader, learn from your mistakes, and always put relationships first!&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10404324</link>
      <guid>https://www.technologyfirst.org/Tech-News/10404324</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Thu, 22 Apr 2021 18:28:49 GMT</pubDate>
      <title>CompTIA A+ Certification Training (1001 &amp; 1002 Exam Vouchers Included)</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/eblast_TechFirst_CompTIA%20Aplus.jpg" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10552214</link>
      <guid>https://www.technologyfirst.org/Tech-News/10552214</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Thu, 22 Apr 2021 18:25:50 GMT</pubDate>
      <title>CompTIA IT Fundamentals Training (Exam Vouchers Included)</title>
      <description>&lt;p&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/eblast_TechFirst_IT%20Fundamentals.jpg" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10552212</link>
      <guid>https://www.technologyfirst.org/Tech-News/10552212</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Tue, 20 Apr 2021 20:18:02 GMT</pubDate>
      <title>Husted Announces Pilot Program Linking High School Students to Tech Internships</title>
      <description>&lt;p&gt;&lt;a href="https://www.technologyfirst.org/resources/Documents/High%20School%20Tech%20Internship%20Pilot%20Program%20-%20Ohio%20Businesses.pdf" target="_blank"&gt;High School Tech Internship Pilot Program - Ohio Businesses.pdf&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The High School Tech Internship pilot program is an opportunity for Ohio employers to hire high school interns and receive reimbursement for their wages.&lt;/p&gt;

&lt;p&gt;The High School Tech Internship Pilot Program will connect 100 Ohio high school students with technology careers and businesses in Ohio. Businesses can hire summer interns by contacting one of 12 pilot sites across the state. Visit Workforce.Ohio.gov/HSTechInternship to learn how to participate in the program. Interns should be placed in technology roles that focus on software, data, cloud and IT infrastructure, and cybersecurity. Students will be expected to perform job duties similar to what would be expected in an entry-level position.&lt;/p&gt;

&lt;p&gt;Wage Reimbursement:&amp;nbsp;&lt;/p&gt;

&lt;p&gt;To qualify for wage reimbursement, employers must submit documentation proving that the individual was employed for a minimum of 150 hours and was paid at least $12 per hour. Employers will receive a higher wage reimbursement for younger students to help more students experience technology careers at an earlier age.&lt;br&gt;&lt;/p&gt;

&lt;p&gt;Questions? Please contact the High School Tech Internship team via email: High_School_Tech_Internship@Development.Ohio.gov&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10332603</link>
      <guid>https://www.technologyfirst.org/Tech-News/10332603</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Tue, 13 Apr 2021 13:12:50 GMT</pubDate>
      <title>ATC Rebrands and Relocates to Liberty Center</title>
      <description>&lt;p&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;&lt;font&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/AnnualPartners/PRIMARY-ATC-Color-600px.png" alt="" title="" border="0" width="230" height="113"&gt;&lt;br&gt;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;&lt;font&gt;Advanced Technology Consulting (ATC) has rolled out a refreshed logo, branding, and website to reflect ATC’s position more accurately in the digital transformation marketplace. In addition, ATC recently signed a lease for ~7,000 square feet of Class A office space on the fourth floor of&lt;/font&gt; &lt;a href="https://www.liberty-center.com/" target="_blank"&gt;&lt;font&gt;Liberty Center&lt;/font&gt;&lt;/a&gt;&lt;font&gt;, a mixed-use community in Liberty Township, just north of Cincinnati.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;ATC is an independent IT consulting firm specializing in digital transformation in four core areas: voice, network, cloud and cybersecurity.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;ATC will officially move into the new space this August. The need for new space has been fueled by ATC’s growth—eight consecutive record years—and demand for additional talent. ATC recently added three IT consultants and has tripled its Cincinnati workforce in a little over two years. Aggressive plans to onboard additional IT talent are part of ATC’s growth strategy.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;&lt;font&gt;“With our growing team, we need a space that will fully engage our employees, clients, and partners on multiple fronts,” says&lt;/font&gt; &lt;a href="https://www.linkedin.com/in/davidgoodwin4atc/" target="_blank"&gt;&lt;font&gt;David Goodwin&lt;/font&gt;&lt;/a&gt;&lt;font&gt;, ATC Managing Partner &amp;amp; Co-Founder. “Liberty Center and our new office space will do just that. We’re eager to embrace this new brand and move to Liberty Center. Our new location on the I-75 corridor will allow us to further develop our regional presence.”&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;ATC’s new logo and brand colors are refreshed but not altogether new. What remains as part of the new brand identity is the triangle, the blue and gray colors, and “ATC” spelled out in all caps. What is new is the aqua color and the 3D-like, technology-forward favicon. Phase one of ATC’s new website is up and running, with phase two slated for release in May.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;ATC’s new brand will be reflected within the new space, and ATC is currently working through an experiential design process that will exhibit ATC’s technology-forward brand characteristics. As conceived, the office will be a hub for collaboration where talent, technology, and expertise unite. Naturally, the space will utilize and showcase the technologies ATC evangelizes every day with clients.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;&lt;font&gt;“It’s an exciting time for us,” says&lt;/font&gt; &lt;a href="https://www.linkedin.com/in/louiehollmeyer/" target="_blank"&gt;&lt;font&gt;Louie Hollmeyer&lt;/font&gt;&lt;/a&gt;&lt;font&gt;, ATC director of marketing and consultant. “Our work with clients has been wrapped around digital transformation for some time now, and it was essential for us to create a refreshed brand identity to better align with today and tomorrow.”&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;By joining the Liberty Center community, Cincinnati’s hottest suburban hub, ATC will have access to unmatched amenities and finishes. The center offers immersive experience of endless dining and retail options, multifamily housing, onsite parking and community events. ATC’s new office also has excellent drive-by visibility and convenient access to both the Cincinnati and Dayton metropolitan areas, including Northern Kentucky.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;&lt;font&gt;To learn more, visit ATC&lt;/font&gt; &lt;a href="https://4atc.com/atc-reveals-brand-digital-transformation-dx/" target="_blank"&gt;&lt;font&gt;here&lt;/font&gt;&lt;/a&gt;&amp;nbsp;&lt;font&gt;and&lt;/font&gt; &lt;a href="https://4atc.com/relocate-cincinnati-office-liberty-center/" target="_blank"&gt;&lt;font&gt;here&lt;/font&gt;&lt;/a&gt;&lt;font&gt;.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10307485</link>
      <guid>https://www.technologyfirst.org/Tech-News/10307485</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Tue, 06 Apr 2021 16:31:51 GMT</pubDate>
      <title>It's TechCred Time Again - Free Training Funds</title>
      <description>&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;" color="#DD4A3A"&gt;&lt;span style=""&gt;&lt;span style=""&gt;Sinclair College Announcement&lt;/span&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" color="#333333" style="font-size: 16px;"&gt;&lt;strong&gt;&lt;font&gt;Who doesn’t want to qualify for free training funds?&lt;/font&gt;&lt;/strong&gt;&lt;font&gt;&amp;nbsp;Right now is a great time to increase your current employees technical skills.&amp;nbsp;The department of Workforce Development at&lt;/font&gt; &lt;a href="https://workforce.sinclair.edu/" target="_blank"&gt;&lt;font&gt;&lt;font&gt;Sinclair College&lt;/font&gt;&lt;/font&gt;&lt;/a&gt;&lt;font&gt;&amp;nbsp;has&amp;nbsp;several programs&amp;nbsp;eligible for state funding&amp;nbsp;with&amp;nbsp;Ohio&amp;nbsp;TechCred.&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;font&gt;We anticipated it opening again in March, however, they made some changes to the program and it reopened &lt;strong&gt;1 April&lt;/strong&gt;.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" color="#333333" style="font-size: 16px;"&gt;&lt;font&gt;TechCred&amp;nbsp;is&amp;nbsp;Ohio's innovative workforce program that reimburses employers for industry-recognized, technology-focused, credentialed training programs and certificates. The training must be completed within &lt;em&gt;12 months now&lt;/em&gt;&amp;nbsp;and&amp;nbsp;the current online application period is&lt;/font&gt; &lt;font&gt;open as of &lt;strong&gt;April 1st&lt;/strong&gt;&lt;/font&gt;&lt;font&gt;.&lt;/font&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;font&gt;Now is the time to start thinking of who needs upskilled!&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" color="#333333" style="font-size: 16px;"&gt;&lt;strong&gt;&lt;font&gt;Here are some things you should know, including changes from previous funding rounds:&lt;/font&gt;&lt;/strong&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" color="#333333" style="font-size: 16px;"&gt;1.&lt;font&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; &lt;font&gt;Employers will identify the specific, technology-centric qualifications they need, as well as the employee(s) they want to upskill.&lt;/font&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" color="#333333" style="font-size: 16px;"&gt;2.&lt;font&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; &lt;font&gt;To qualify for reimbursement of training costs, the employer must partner with a training provider and&amp;nbsp;&lt;/font&gt;&lt;a href="http://ohiomfg.informz.net/z/cjUucD9taT0yNzQwODU2JnA9MSZ1PTM2MjExODc4NyZsaT0yMDQwNzgwOQ/index.html" target="_blank"&gt;&lt;font&gt;&lt;font&gt;apply online&lt;/font&gt;&lt;/font&gt;&lt;/a&gt;&lt;font&gt;. Individuals must be&amp;nbsp;Ohio&amp;nbsp;residents with a verifiable&amp;nbsp;Ohio&amp;nbsp;address.&lt;/font&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" color="#333333" style="font-size: 16px;"&gt;3.&lt;font&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; &lt;strong&gt;&lt;font&gt;The length of the grant will be reduced from 18 months to 12 months from the award date.&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" color="#333333" style="font-size: 16px;"&gt;4.&lt;font&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; &lt;strong&gt;&lt;font&gt;Training programs must start on or after the date of the award, not before, and must be completed in less than 12 months.&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" color="#333333" style="font-size: 16px;"&gt;5.&lt;font&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; &lt;font&gt;The state will reimburse up to $2,000 of training costs per credential upon completion. &lt;em&gt;There is no longer a limit of one reimbursement available per employee in each funding round.&lt;/em&gt;&lt;/font&gt;&lt;em&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/em&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" color="#333333" style="font-size: 16px;"&gt;6.&lt;font&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; &lt;font&gt;Employers are eligible to receive up to $30,000 per funding round.&lt;/font&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" color="#333333" style="font-size: 16px;"&gt;7.&lt;font&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; &lt;font&gt;The application period begins&lt;/font&gt; &lt;font&gt;April 1st and will end on April 30th&lt;/font&gt;&lt;font&gt;.&amp;nbsp;&lt;/font&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" color="#333333" style="font-size: 16px;"&gt;8.&lt;font&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/font&gt; &lt;a href="https://techcred.ohio.gov/wps/portal/gov/techcred" target="_blank"&gt;&lt;font&gt;&lt;font&gt;Click here&lt;/font&gt;&lt;/font&gt;&lt;/a&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;font&gt;for more information about the&amp;nbsp;TechCred&amp;nbsp;program.&lt;/font&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#333333" style="font-size: 16px;"&gt;&lt;font style="font-family: Verdana;"&gt;Wondering what you could use it for? Many companies in the area have already used it to&lt;/font&gt; &lt;font style="font-family: Verdana;"&gt;streamline workflow and improve productivity with Microsoft Office training. Learn to effectively manage projects, analyze data or build PivotTables with Microsoft Office training&lt;/font&gt;&lt;font style="font-family: Verdana;"&gt;.&lt;/font&gt; &lt;font style="font-family: Verdana;"&gt;With courses for beginners to power users, you can gain the skills you need to master the features and functions of the Microsoft Office suite&lt;/font&gt;&lt;font style="font-family: Verdana;"&gt;.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" color="#333333" style="font-size: 16px;"&gt;&lt;a href="https://techcred.ohio.gov/wps/portal/gov/techcred/about/credential-list/" target="_blank"&gt;&lt;strong&gt;&lt;span style="background-color: white;"&gt;&lt;font&gt;Eligible Industry Areas&lt;/font&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/a&gt;&lt;span style="background-color: white;"&gt;&lt;font&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;ol&gt;
  &lt;li&gt;&lt;font face="Verdana" color="#333333"&gt;&lt;span style="background-color: white;"&gt;&lt;font style="font-size: 16px;"&gt;Business Technology &lt;strong&gt;(think Adobe Creative Suite or Photoshop for your marketing)&lt;/strong&gt;&lt;/font&gt;&lt;/span&gt;&lt;span style="background-color: white;"&gt;&lt;font style="font-size: 16px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" color="#333333"&gt;&lt;span style="background-color: white;"&gt;&lt;font style="font-size: 16px;"&gt;Construction Technology&lt;/font&gt;&lt;/span&gt;&lt;span style="background-color: white;"&gt;&lt;font style="font-size: 16px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" color="#333333"&gt;&lt;span style="background-color: white;"&gt;&lt;font style="font-size: 16px;"&gt;Healthcare Technology&lt;/font&gt;&lt;/span&gt;&lt;span style="background-color: white;"&gt;&lt;font style="font-size: 16px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" color="#333333"&gt;&lt;span style="background-color: white;"&gt;&lt;font style="font-size: 16px;"&gt;Information Technology&lt;/font&gt;&lt;/span&gt;&lt;span style="background-color: white;"&gt;&lt;font style="font-size: 16px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;strong&gt;&lt;span style="background-color: white;"&gt;&lt;font style="font-size: 16px;"&gt;(think Microsoft, Excel or Word)&lt;/font&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" color="#333333"&gt;&lt;span style="background-color: white;"&gt;&lt;font style="font-size: 16px;"&gt;IoT &amp;amp; Cybersecurity Technology&lt;/font&gt;&lt;/span&gt;&lt;span style="background-color: white;"&gt;&lt;font style="font-size: 16px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" color="#333333"&gt;&lt;span style="background-color: white;"&gt;&lt;font style="font-size: 16px;"&gt;Manufacturing Technology&lt;/font&gt;&lt;/span&gt;&lt;span style="background-color: white;"&gt;&lt;font style="font-size: 16px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;strong&gt;&lt;span style="background-color: white;"&gt;&lt;font style="font-size: 16px;"&gt;(think SkillsTrac Industrial Maintenance, CNC Machining or GD&amp;amp;T)&lt;/font&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" color="#333333"&gt;&lt;span style="background-color: white;"&gt;&lt;font style="font-size: 16px;"&gt;Military &amp;amp; Smart Transportation&lt;/font&gt;&lt;/span&gt;&lt;span style="background-color: white;"&gt;&lt;font style="font-size: 16px;"&gt;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;strong&gt;&lt;span style="background-color: white;"&gt;&lt;font style="font-size: 16px;"&gt;(automotive training, such as diesel maintenance)&lt;/font&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" color="#333333" style="font-size: 16px;"&gt;&lt;span style="background-color: white;"&gt;&lt;font&gt;Robotics/Automation&lt;/font&gt;&lt;/span&gt; &lt;strong&gt;&lt;span style="background-color: white;"&gt;&lt;font&gt;(think electrical troubleshooting or robotic programming)&lt;/font&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;font face="Verdana" color="#333333" style="font-size: 16px;"&gt;Please contact Karolyn Ellingson if you have any questions.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font face="Verdana" color="#333333" style="font-size: 16px;"&gt;Karolyn Ellingson, M.Ed.&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" color="#333333" style="font-size: 16px;"&gt;&lt;font&gt;Workforce Development Manager&lt;br&gt;&lt;/font&gt; &lt;strong&gt;&lt;font&gt;Sinclair Community College&lt;/font&gt;&lt;/strong&gt; &lt;font&gt;&lt;strong&gt;|&lt;/strong&gt; 5380 Courseview Dr &lt;strong&gt;|&lt;/strong&gt; Mason, OH 45040&lt;br&gt;&lt;/font&gt;&lt;strong&gt;&lt;font&gt;O:&lt;/font&gt;&lt;/strong&gt; &lt;strong&gt;&lt;font&gt;937.512.5584&lt;/font&gt;&lt;/strong&gt; &lt;font&gt;&lt;strong&gt;|&lt;/strong&gt;&lt;/font&gt; &lt;font&gt;M:&lt;/font&gt;&lt;font&gt;937.416.6556&lt;strong&gt;|&lt;/strong&gt;&lt;/font&gt; &lt;font&gt;F:&lt;/font&gt; &lt;font&gt;937.512.5591&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;u&gt;&lt;a href="mailto:karolyn.ellingson@sinclair.edu" target="_blank"&gt;&lt;font face="Verdana" color="#333333" style="font-size: 16px;"&gt;karolyn.ellingson@sinclair.edu&lt;/font&gt;&lt;/a&gt;&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__workforce.sinclair.edu_&amp;amp;d=DwMF-g&amp;amp;c=JesJK96_Y5k_PRgE47VU3A&amp;amp;r=9LT9gMh8Mxs7D7mwnE2xhO5M8KZNODZvvh8PhAT_z18&amp;amp;m=rW_lBzV8g-XJHbp6choxfHlMhTCoHOQzsa91-Ub8TpM&amp;amp;s=HWxf98IeZgQbaRKVn_6gmfBL8Uckr3HRqB7stbO31QA&amp;amp;e=" target="_blank"&gt;&lt;font face="Verdana" color="#333333" style="font-size: 16px;"&gt;workforce.sinclair.edu&lt;/font&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10279646</link>
      <guid>https://www.technologyfirst.org/Tech-News/10279646</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Mon, 01 Mar 2021 21:27:43 GMT</pubDate>
      <title>Technology First &amp; Cybersecurity</title>
      <description>&lt;p&gt;&lt;font color="#DD4A3A" style="font-size: 18px;"&gt;&lt;font&gt;&lt;span style=""&gt;&lt;font face="Verdana" style=""&gt;Lisa Heckler&lt;span style=""&gt;,&amp;nbsp;&lt;/span&gt;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;span style=""&gt;VP Information Security &amp;amp; Privacy, CareSource and&amp;nbsp;&lt;/span&gt;&lt;span style=""&gt;Technology First Board of Directors&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Verdana" style="font-size: 16px;"&gt;Is your life feeling a bit like Groundhog's Day? Needing something to snap you out of the Winter Blues? Look no further than Technology First for exciting volunteer, network and educational opportunities in the Dayton and Southwest Ohio region… and virtually beyond! Here's a peek into what's coming up related to my favorite topic - cybersecurity:&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Verdana" style="font-size: 16px;"&gt;&lt;u&gt;Girl Scouts Cyber Challenge - Calling All Cybersecurity Professionals&lt;/u&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Verdana" style="font-size: 16px;"&gt;What??? The Moon has been hacked?! Girls in grades 6 - 12 will come to the rescue of the Moon Base as part of the 2021 Girl Scouts Cyber Challenge. This all day event will immerse attendees in the world of cybersecurity. Along the way they will solve interesting problems (no experience necessary) and meet real world cybersecurity professionals.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Verdana" style="font-size: 16px;"&gt;Will you join me in creating an exciting experience for our young women who are interested in cybersecurity? The event will take place at the end of July (day to be finalized) and we need day-of volunteers to make it happen.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Verdana" style="font-size: 16px;"&gt;&lt;u&gt;Cyber SIG - Calling All Cyber Security Professionals… AGAIN!&lt;/u&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Verdana" style="font-size: 16px;"&gt;Technology First is starting a new special interested group focused on Cybersecurity. The group will meet quarterly starting with the virtual OISC (see below for more info on the OISC). Our next meeting will be on June 3 featuring local cybersecurity expert Bryan Fite. If you've met Bryan you know that this is sure to be an interesting evening filled with information on Bryan's latest research as well as lots of conversation on the latest threats and trends in cybersecurity. Technology First will be sending out more information as we get closer to the event.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Verdana" style="font-size: 16px;"&gt;If you have questions or would like to submit a topic or speaker for consideration for a future event, please email&amp;nbsp;&lt;a href="mailto:kregan@technologyfirst.org." target="_blank"&gt;&lt;font color="#215F9D"&gt;kregan@technologyfirst.org.&lt;/font&gt;&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Verdana" style="font-size: 16px;"&gt;&lt;u&gt;Ohio Information Security Conference (OISC) - Last Call for Cybersecurity Professionals!&lt;/u&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Verdana" style="font-size: 16px;"&gt;(And anyone interested in learning more about Cybersecurity)&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Verdana" style="font-size: 16px;"&gt;We have another interesting and informative OISC on tap for 2021 including keynote speaker Duane Harrison, Chief Scientist, National Air and Space Intelligence Center (NASIC), Wright-Patterson Air Force Base. NASIC is the Air Force analysis center for foreign air, space and specialized intelligence. As Chief Scientist, Mr. Harrison guides the 4,100-person center’s analytic production mission, ensuring timely delivery of relevant intelligence data products and services to Air Force and joint operational warfighters, acquisition and force modernization communities, and senior defense and intelligence community policymaking customers.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Verdana" style="font-size: 16px;"&gt;Additionally, there are four tracks featuring cybersecurity practitioners sharing real life experiences, practical guidance, and thought leadership, as well as technology vendors sharing the latest tips, tricks and tools to address our cybersecurity concerns. The tracks are focused Cybersecurity Trends &amp;amp; Directions, Applied Cybersecurity, Cyber R&amp;amp;D, and Roundtable Discussions.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Verdana" style="font-size: 16px;"&gt;&lt;font&gt;Please join me at the all virtual OISC on Wednesday, March 10!&amp;nbsp;&lt;/font&gt;&lt;strong&gt;&lt;font color="#205D9E" style="font-size: 16px;"&gt;Registration &amp;amp; Details Here!&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10235273</link>
      <guid>https://www.technologyfirst.org/Tech-News/10235273</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Mon, 01 Mar 2021 21:22:37 GMT</pubDate>
      <title>How can automation be used in cybersecurity threat response?</title>
      <description>&lt;p&gt;&lt;font face="Verdana" color="#DD4A3A" style="font-size: 18px;"&gt;&lt;span style=""&gt;Shawn Waldman, CEO, Secure Cyber Defense&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Verdana" style="font-size: 16px;"&gt;When it comes to cyber threats, every second counts.&amp;nbsp;Quickly identifying a security breach or cyber threat minimizes the damage and cost to an organization. Unfortunately, the volume of threat alerts an organization receives every day, from multiple security systems, creates an overload of tickets needing to be analyzed, prioritized, and investigated.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Verdana" style="font-size: 16px;"&gt;Hackers are now using artificial intelligence to make their own criminal activities more efficient. If cybercriminals are using automation technologies, it makes sense that cybersecurity professionals do the same to stay one step ahead.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Verdana" style="font-size: 16px;"&gt;&lt;font style="font-size: 16px;"&gt;Heightened productivity, consistency, and keeping up with increasingly complex security needs are all solid advantages for adopting automation.&lt;/font&gt;&lt;font style="font-size: 16px;"&gt;&amp;nbsp;With automation and Artificial Intelligence (AI), repetitive tasks like manually sifting through threat alerts can be handled quickly and efficiently. Automation technologies also use vast amounts of threat intelligence to quickly identify and address emerging threats—specifically sophisticated threats designed to avoid detection. Through the use of playbooks, systems can quickly and efficiently eliminate risk. This quick response reduces Mean Time To Detection (MTTD) and Mean Time To Response (MTTR) saving companies time, expense, and downtime.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Verdana" style="font-size: 16px;"&gt;There are five ways artificial intelligence and automation fill a need for data security teams:&lt;/font&gt;&lt;/p&gt;

&lt;ol&gt;
  &lt;li&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;Machine learning-powered security can quickly spot and automatically address sophisticated new threats&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;Automated tools can uncover and fix vulnerabilities before attackers can exploit them&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;Tasks can be automated to extend the capabilities of security teams and reduce alert fatigue&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;Automation handles threat analysis and response in a matter of seconds, 24/7&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;As part of a larger security solution, automated platforms work together in a coordinated response&lt;/font&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;h2 style="line-height: 20px;"&gt;&lt;font color="#000000" style="font-size: 32px;"&gt;&lt;strong&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;WHY ISN’T EVERYONE RELYING ON THESE TOOLS?&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/h2&gt;

&lt;p style="line-height: 25px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 16px;"&gt;If AI-powered automation tools are providing more accurate and timely results than humans, why isn’t everyone using them?&amp;nbsp;For one, automation tools are behavior-based, meaning they need data to inform their learning and actions. Cost can also be a factor since these platforms require expertise to configure and manage, often requiring outside Managed Security Service Provider (MSSP) support. Finally, automation needs to be part of an overall cybersecurity plan, rather than simply patching a hole.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 25px;"&gt;&lt;font color="#000000" face="Verdana" style="font-size: 16px;"&gt;&lt;font&gt;First and foremost, organizations need to be sure they have the basic security measures in place, like adhering to the CIS Top 20 Controls to stop the most pervasive and dangerous cyber threats.&amp;nbsp;&lt;/font&gt;&lt;font&gt;Having the basics in place before jumping into AI- and machine-learning platforms is the best place to start. Some of the basic elements include:&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;Understanding your network and the devices on your network&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;Addressing perimeters such as firewalls, intrusion prevention systems, and encryption&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;Secure network coverage such as SIEM, SD-Wan, and VPNs&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;End-point protection such as antivirus and anti-malware&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;Good email security and hygiene&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;Controlling the use of admin privileges&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;Proper password management&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;Ensuring firewalls, email gateways, and other security devices are properly configured&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 16px;"&gt;Resources behind the scenes to satisfy training needs, create awareness, and develop a positive cybersecurity culture&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;font color="#000000" face="Verdana" style="font-size: 16px;"&gt;Automation isn’t replacing security teams, rather automation enhances the skills and capabilities available. Minimizing human errors in repetitive cybersecurity tasks is a benefit of automation. Automation provides consistency reducing error rates and increasing protections. A higher level of detection and speed of response means there is a quicker link between suspicious behavior and action. Over time, as AI-powered platforms continue to learn your network environment and ingest threat intelligence data, their benefits to your organization will continue to improve.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Verdana" style="font-size: 16px;"&gt;&lt;font style="font-size: 16px;"&gt;Automation can be rapid, agile, and consistent. What automation can’t be is creative and curious. When security processes are automated, security teams are freed up to exercise their creativity to solve problems and build more comprehensive security approaches.&amp;nbsp;&lt;/font&gt;&lt;font style="font-size: 16px;"&gt;Cybersecurity professionals still need to decide what servers or networks to isolate, when incident response teams need to be brought in, plus determine what changes should be made to policies and procedures to institute corrective actions.&amp;nbsp;&amp;nbsp;Like everything else in the IT stack, it comes down to needs, workload, and budget to determine how much automation will deliver a return on your investment.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" style="font-size: 16px;"&gt;&lt;strong&gt;&lt;font color="#0C0C0D" face="Verdana" style="font-size: 16px;"&gt;So, What’s the Answer?&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#0C0C0D" face="Verdana" style="font-size: 16px;"&gt;The reality is that the complexity of technology and the amount of data that must be watched and analyzed is not slowing down. In order to manage the growing threat surface and threat alerts, security automation and integration tools will continue to evolve with the same urgency to support security teams. Is your company prepared to take advantage of automation? If not, how will you develop strategies to keep up with the speed and sophistication of cyber threats?&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Verdana" style="font-size: 16px;"&gt;Shawn Waldman&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" face="Verdana" style="font-size: 16px;"&gt;Is the CEO and Founder of Miamisburg-based Secure Cyber Defense. With over 20 years of experience in cybersecurity and information systems, his team designs, manages, and monitors cybersecurity solutions, responding to threats and protecting organizations from cybercriminals.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10235280</link>
      <guid>https://www.technologyfirst.org/Tech-News/10235280</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Mon, 01 Mar 2021 17:42:06 GMT</pubDate>
      <title>IT Leader Spotlight: John Huelsman</title>
      <description>&lt;p&gt;&lt;font face="Verdana" color="#DD4A3A"&gt;&lt;font color="#DD4A3A" face="Verdana"&gt;John Huelsman, IT Director, Hobart Service&lt;/font&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" color="#DD4A3A"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Headshots/john%20huelsman.png" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" color="#1F272B"&gt;&lt;strong&gt;What was your first job?&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;span style=""&gt;&lt;font color="#1F272B"&gt;IT related – Computer Services at BGSU.&amp;nbsp; I worked part-time while a student at BG.&amp;nbsp; Go Falcons!&lt;/font&gt;&lt;/span&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font color="#1F272B"&gt;&lt;span style=""&gt;Non-IT related – paperboy (5&lt;/span&gt;&lt;sup style="font-family: Verdana;"&gt;th&lt;/sup&gt; &lt;span style=""&gt;grade to 9&lt;/span&gt;&lt;sup style="font-family: Verdana;"&gt;th&lt;/sup&gt; &lt;span style=""&gt;grade).&lt;/span&gt;&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;font face="Verdana" color="#1F272B"&gt;&lt;strong&gt;Did you always want to work in IT?&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" color="#1F272B"&gt;Nope, My initial career thoughts were towards teaching and/or coaching.&amp;nbsp; However, three of my older siblings graduated college in the IT field and got decent jobs so that led me to eventually explore it as a possibility.&amp;nbsp; I was proficient in math and science, so my high school guidance counselor pointed me in that direction as well.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" color="#1F272B"&gt;&lt;strong&gt;What advice would you give to aspiring IT leaders?&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;font style="font-family: Verdana;" color="#1F272B"&gt;Be patient.&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;span style=""&gt;&lt;font color="#1F272B"&gt;Observe and listen to leaders you respect.&amp;nbsp; Similarly, find a mentor and talk to him/her regularly.&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/li&gt;

  &lt;li&gt;&lt;span style=""&gt;&lt;font color="#1F272B"&gt;Get involved in professional networking organizations (like Technology First) and build your network of contacts.&lt;/font&gt;&lt;/span&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font style="font-family: Verdana;" color="#1F272B"&gt;See the big picture regarding your overall business and markets.&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font color="#1F272B"&gt;&lt;span style=""&gt;Put yourself out there and take risks. Volunteer for stretch assignments that get you out of your comfort zone.&amp;nbsp; “Progress always involves risk.&amp;nbsp; You can’t steal 2&lt;/span&gt;&lt;sup style="font-family: Verdana;"&gt;nd&lt;/sup&gt; &lt;span style=""&gt;base and keep your foot on 1&lt;/span&gt;&lt;sup style="font-family: Verdana;"&gt;st&lt;/sup&gt;&lt;span style=""&gt;.” – Fredrick B. Willcox&lt;/span&gt;&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;span style=""&gt;&lt;font color="#1F272B"&gt;Take ownership of your career – it is ultimately your responsibility.&lt;/font&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10249239</link>
      <guid>https://www.technologyfirst.org/Tech-News/10249239</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Mon, 01 Mar 2021 17:39:46 GMT</pubDate>
      <title>IT Leader Spotlight: Matt Coatney</title>
      <description>&lt;p&gt;&lt;font face="Verdana" color="#DD4A3A"&gt;&lt;font color="#DD4A3A" face="Verdana"&gt;Matt Coatney, CTO, HBR Consulting&lt;/font&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" color="#DD4A3A"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Headshots/matt%20coatney.png" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font face="Verdana" color="#000000"&gt;What was your first job?&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" color="#000000"&gt;Software engineer for an AI software startup in the pharmaceutical/drug discovery space (by far the most geek-cool job I’ve had!)&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font face="Verdana" color="#000000"&gt;Does the conventional CIO role include responsibilities it should not hold? Should the role have additional responsibilities it does not currently include?&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" color="#000000"&gt;The challenge of the modern CIO is that you still must “keep the trains running on time” – ensuring that core systems like email, network, and infrastructure are rock solid and secure – but that is no longer enough by itself. That’s table stakes. The role is also increasingly looked to for advice and initiatives that transform the business through technology in areas like analytics, cloud, mobile, IoT, and the like. In mid-sized organizations especially, the CIO is looked to as the security, data, and innovation officer too, which requires intense focus and energy to balance all these plates. &amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font face="Verdana" color="#000000"&gt;What advice would you give to aspiring IT leaders?&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" color="#000000"&gt;Be non-traditional. Avoid the typical, predictable career ladder. Pick up special assignments and roles that stretch your comfort zone and give you experience in all sorts of different disciplines: cutting-edge technology, operations, security, finance, economics, law, etc. The future leader will need a wide range of skills – including the skill and passion of continuous learning – to keep up with the rapid acceleration of technology and the world of work.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10249203</link>
      <guid>https://www.technologyfirst.org/Tech-News/10249203</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Mon, 01 Mar 2021 17:37:53 GMT</pubDate>
      <title>The Key to Success? Failure</title>
      <description>&lt;p&gt;&lt;font color="#DD4A3A" face="Verdana"&gt;Mardi Humphreys, Change Agent, Integration Edge - a division of RDSI&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;There’s an old adage: if you’re the smartest person in the room, you’re in the wrong room. When it comes to work, let’s just say, I’m in the correct Zoom room A LOT. I like to think it’s just a diversity of gifts. My coworkers bring the technical knowledge necessary for building solutions and I bring them challenges to solve. But every little mistake I make feeds a low-grade lack of confidence and makes me wonder, “What if I fail?”&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;When the thought occurs, I have to stop and remind myself that everyone fails. In fact, failure is a necessary step to success. If I approach projects with curiosity, seek to understand, and demonstrate I’m both listening and learning; then failure becomes part of the problem-solving process. It can even help bond the team. Failure presents an opportunity to highlight everyone’s unique roles and particular skill sets. This allows me to frame failures as experiments I need the team’s talents to finish. We can analyze where things went wrong, gather data, and move on. We want to fail fast, forward, and with feedback. Not every piece of code is written correctly the first time. It’s why development, staging, and production environments exist. Development and staging are places designed for experimenting, testing, and failing before putting the final solution into production. This method doesn’t have to be used exclusively for software development. It can apply to any project team.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;Development: This is the brainstorming phase. Wacky ideas are welcome in this no-judgement-allowed preliminary formation of plans. Blue sky thinking happens here. At this point, we know where the client is and where he wants to go. Now, we figure out how to get them there. Everyone is encouraged to contribute then go test their ideas on their own. Think proof of concept.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;font style="font-size: 16px;"&gt;Staging: This is the evaluation phase. Still a no-judgement zone, everyone brings their idea that passed testing and combines it with everyone else’s bit; much like connecting to a network. The results of wacky-ideas testing are discussed. Would this idea actually work? Do we have the necessary resources to make it happen? The team looks for obstacles to the solution’s success and adjustments are made. Will the client be able to afford this? Does an off-the-shelf solution already&lt;/font&gt; &lt;font style="font-size: 16px;"&gt;exist&lt;/font&gt;&lt;font style="font-size: 16px;"&gt;? Think prototype.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;Production: The individual experiments have been combined, vetted, tested, run, and are ready to present to the client as a solution or at least a roadmap. Think demonstration, or, if more fully evolved, think deliverable.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;This approach produces more ideas and more solutions more quickly. Business moves at the speed of trust. If we create a safe environment in which to fail, it not only saves time, but also creates a more compassionate, patient, and bonded team. Embracing failure can turn smart people into leaders, mentors, and coaches who will help the team build sustainable trust. Shifting to this mindset frees us from the fear of failure. It inspires us to use failure as a tool and puts us in the same category as Thomas Edison, the Wright brothers, and Sara Blakely. Talk about great company to be in!&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10249197</link>
      <guid>https://www.technologyfirst.org/Tech-News/10249197</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Mon, 01 Mar 2021 17:35:37 GMT</pubDate>
      <title>6 Must-Have Ransomware Protection Features (And One Nice-to-Have)</title>
      <description>&lt;p&gt;&lt;font color="#DD4A3A" face="Verdana"&gt;Chi Corporation and StorageCraft&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;Just about every story you read about responding to ransomware includes the directive to “never pay the ransom.” That’s easy enough to say if you’re not the one whose data is being held hostage. And the odds are pretty good it will happen to your company. CyberEdge’s 2020 Cyberthreat Defense Report calls out that nearly seven-in-10 companies will be affected by ransomware attacks.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;So, it’s pretty clear you need to put the protections in place that keep ransomware out. You may think that means bolstering endpoint security since that’s where most ransomware attacks originate, but the reality is that 77 percent of organizations that have been infected with ransomware were running up-to-date endpoint protections.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;Since it’s almost impossible to prevent every ransomware attack, what you need is a backup and disaster recovery solution that lets you bounce back from an attack, as unscathed as possible. We suggest you consider the following features when shopping for such a solution:&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;1. Get Continuous Data Protection&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;You never know when ransomware will strike, so you need to be prepared. Look for a solution that protects your data at all times by automatically taking continuous, space-optimized, image-based backups.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;2. Look for Efficient Multi-Site Replication&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;You’ll want automatic replication of your backups offsite, or at least off-network, as well as to the cloud. This should be able to be accomplished simply by selecting the machines you want to back up and pointing their backups to the desired backup targets using a checkbox or a drag-and-drop interface.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;3. Simplify Data Protection with an SLA-Driven Workflow&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;An optimized workflow for SLA-driven data protection should include a “set and forget” policy feature for data protection and management, with a browser-based dashboard that gives you a single workflow to protect and manage both physical and virtual infrastructures. It should give you a global view of all of your recovery points, and let you schedule and manage local backups, set up onsite, offsite, and cloud replication, and retention schedules. A solution with proactive error detection and alerting will further help simplify management and speed problem resolution.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;4. Make Sure Your Data Integrity Is Absolutely Reliable&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;Choose a data protection solution that ensures your backups will be there when you need them. Inflight verification and automated re-verification of backup images mean you’ll have backups you can count on. Other features like smart retries, self-healing repairs, and PKI-based encrypted channel communication increase backup reliability even more.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;5. Include Instant, Flexible Recovery&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;Because every minute of downtime caused by ransomware is very expensive, you’ll want a solution that lets you get back in business immediately. That should mean you can get back up and running in milliseconds.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;You’ll also want to be able to directly recover to your primary store, eliminating the need for vMotion and eliminating any performance impacts during recovery. Being able to recover to dissimilar hardware or virtual environments is another valuable feature for ensuring flexible recovery by letting you use available resources instead of waiting for specific resources.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;6. Count on Integrated, Cloud-Based DRaaS&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;The best way to ensure total business continuity is to go with cloud-based DRaaS that delivers orchestrated, one-click virtual failover. So you don’t have to wait for anyone, recovery should be via a self-service portal and not require third-party intervention. Look for DRaaS solutions that include replication as a service and give you the option to recover using seed drives, BMR drives, and web downloads.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;A Nice-to-Have: A Converged Data Platform to Control Costs&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;A solution that unifies data protection and scale-out storage onsite and offsite can help you fight back if ransomware strikes. It can also help you control storage costs and simplify both storage and backup and disaster recovery management.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;Look for a solution that uses an object-based, distributed file system so you can scale non-disruptively, without any need for configuration. Inline deduplication and compression will also save on storage costs. And scale-out storage lets you add capacity as you need it to keep up with your data storage requirements, eliminating forklift upgrades without sacrificing security.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font style="font-size: 16px;" face="Verdana"&gt;Get the Facts&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;&lt;font face="Verdana"&gt;&lt;font style="font-size: 16px;"&gt;For over 50 years, Chi Corporation has been a leading IT solutions provider specializing in data storage, backup and recovery, networking, security, and virtualization. Together with our valued partner StorageCraft, we have helped organizations of all sizes ensure they never have to pay the ransom. For more information and to schedule a demo, please reach out to John Thome, President of Chi Corporation, at 440-498-2310 or&lt;/font&gt; &lt;a href="mailto:jthome@chicorporation.com"&gt;&lt;font style="font-size: 15px;"&gt;&lt;font style="font-size: 16px;"&gt;jthome@chicorporation.com&lt;/font&gt;&lt;/font&gt;&lt;/a&gt;&lt;font style="font-size: 16px;"&gt;. Or learn more at ChiCorporation.&lt;/font&gt;&lt;font style="font-size: 16px;"&gt;com and StorageCraft.com.&amp;nbsp;&lt;/font&gt;&lt;/font&gt;&lt;font color="#DD4A3A"&gt;&lt;br&gt;&lt;/font&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10249180</link>
      <guid>https://www.technologyfirst.org/Tech-News/10249180</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Mon, 01 Mar 2021 17:28:00 GMT</pubDate>
      <title>Secure Access Service Edge (SASE): Getting Sassy in the Cloud</title>
      <description>&lt;p style="line-height: 24px;"&gt;&lt;font face="Verdana"&gt;&lt;span&gt;&lt;span style=""&gt;&lt;font style="" color="#DD4A3A"&gt;Cadre Information Security&lt;/font&gt;&lt;/span&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 24px;"&gt;&lt;font face="Verdana"&gt;&lt;strong&gt;&lt;em&gt;&lt;font color="#444444"&gt;Operating on the edge with vigorous due diligence&lt;/font&gt;&lt;/em&gt;&lt;/strong&gt;&lt;font color="#444444"&gt;&lt;br&gt;
&lt;br&gt;
Moving business processes, applications, and data to the cloud is inevitable as we expand operations and distribute workforces around the globe – yet this fundamental shift provides cybercriminals a central target and more accessible attack vectors to compromise sensitive assets. Consequently, organizations are increasingly challenged to expand the security perimeter, which often forces implementation of controls that are at odds with the evolving cloud environment. Cybersecurity experts argue that secure access service edge (SASE) – pronounced “sassy” – is a timely solution to the current cloud dilemma and it is the future of network security. Continue reading for a glimpse into this cloud-centric operation.&lt;br&gt;
&lt;br&gt;
&lt;strong&gt;A netscape riddled with vulnerabilities&lt;/strong&gt;&lt;br&gt;
&lt;br&gt;
Network security has experienced many evolutions since the early days of the internet and its subsequent explosion into the cloud.&lt;br&gt;
&lt;br&gt;
While the stateless access controls of firewalls nearly a quarter century ago were incapable of protecting emerging stateful technology, the consequent move to proxy technology also proved to be a vain resolve because proxies couldn’t keep up with new applications and network traffic.&lt;br&gt;
&lt;br&gt;
Stateful inspection of applications proved to be more secure and dominated the market for many years, until the explosion of internet applications demanded yet another novel tactic to secure networks.&lt;br&gt;
&lt;br&gt;
Next-generation firewall architecture and an array of network security infrastructures, such as internet protocol virtual private networks and remote access gateways, now enable organizations to more effectively secure traffic destined for headquarters, branch offices, and data centers. But even these solutions create new problems as they solve old ones.&lt;br&gt;
&lt;br&gt;
Now, the inherent risks of migrating applications and data to the cloud, along with protecting the growing pandemic-era remote workforce from cyber threats, perpetuate the multitude of network traffic vulnerabilities that overwhelm CISOs and their security teams.&lt;br&gt;
&lt;br&gt;
&lt;strong&gt;Perhaps it is time to get “sassy” with network security&lt;/strong&gt;&lt;br&gt;
&lt;br&gt;
“The future of network security is in the cloud,” says&amp;nbsp;&lt;/font&gt;&lt;a href="https://blogs.gartner.com/andrew-lerner/2019/12/23/say-hello-sase-secure-access-service-edge/" target="_blank"&gt;&lt;font color="#388462"&gt;Gartner&lt;/font&gt;&lt;/a&gt;&lt;font color="#444444"&gt;, who describes an emerging cybersecurity concept known as Secure Access Service Edge (SASE):&lt;br&gt;
&lt;br&gt;
"In cloud-centric digital business, users, devices, and the networked capabilities they require secure access to are everywhere. What security and risk professionals in a digital enterprise need is a worldwide fabric/mesh of network and network security capabilities that can be applied when and where needed to connect entities to the networked capabilities they need to access."&lt;br&gt;
&lt;br&gt;
While Gartner predicts that more than 40% of businesses will have a strategy to adopt SASE by 2024, many enterprises have already embraced the cloud-based network security service model to converge their multitude of network traffic and managed security products.&lt;br&gt;
&lt;br&gt;
SASE capabilities are delivered in real-time as a service based on the identity of the entity, which includes people, devices, applications, services, IoT systems, and edge computing locations.&lt;br&gt;
&lt;br&gt;
Its cloud-based infrastructure provides flexibility to implement and deliver security services more efficiently, including threat prevention, sandboxing, DNS security, next-generation firewall policies, and web-filtering, among others.&lt;br&gt;
&lt;br&gt;
Integrating full content inspection and enterprise data protection policies into the framework enhances visibility into network activity and improves threat prevention, ultimately minimizing the compromise and theft of sensitive information.&lt;br&gt;
&lt;br&gt;
The model continuously assesses risk throughout network sessions. Plus, exercising Zero Trust in the cloud reduces faulty assumptions and protects sessions even when entities are not connected to the network.&lt;br&gt;
&lt;br&gt;
Not only can operating on a single platform increase performance by allowing us to connect to entities wherever we are located in the world, this approach also eliminates the necessity for multiple point products, which could significantly reduce costs and IT resources.&lt;br&gt;
&lt;br&gt;
“SASE is moving us away from a model of building defensive perimeters and internal checkpoints which replicate a world of physical security to a new viewpoint where users, systems and data carry the requisite security protocols with them as a personal force field connected to a central point of security management,” says Greg Franseth, a seasoned information technology expert and Director of Professional Services at Cadre Information Security.&lt;br&gt;
&lt;br&gt;
&lt;strong&gt;Operating on the edge demands vigorous due diligence&lt;/strong&gt;&lt;br&gt;
&lt;br&gt;
Getting sassy with a single cloud-based platform enables CISOs and risk managers to simplify IT infrastructure and reduce the complexity of network security.&lt;br&gt;
&lt;br&gt;
But as the industry embraces this incredible shift in network security, moving to the cloud creates a new centralized attack surface for cybercriminals to target and exploit.&lt;br&gt;
&lt;br&gt;
We must be mindful that the fundamental objective to prevent attack-ways to our people and sensitive assets hasn’t changed. We must continue to be vigilant and innovate in staying secure.&lt;br&gt;
&lt;br&gt;
Effectively leveraging the cloud will empower us to protect the organization from hostile cyberattacks in novel ways.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 24px;"&gt;&lt;font face="Verdana"&gt;&lt;font color="#444444"&gt;Topics:&amp;nbsp;&lt;/font&gt;&lt;a href="https://blog.cadre.net/topic/secure-access-service-edge" target="_blank"&gt;&lt;font color="#388462"&gt;Secure Access Service Edge&lt;/font&gt;&lt;/a&gt;&lt;font color="#444444"&gt;,&amp;nbsp;&lt;/font&gt;&lt;a href="https://blog.cadre.net/topic/sase" target="_blank"&gt;&lt;font color="#388462"&gt;SASE&lt;/font&gt;&lt;/a&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10249125</link>
      <guid>https://www.technologyfirst.org/Tech-News/10249125</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Mon, 01 Mar 2021 17:24:10 GMT</pubDate>
      <title>An Intro to the New NIST Privacy Framework</title>
      <description>&lt;p&gt;&lt;font color="#DD4A3A" face="Verdana" style="font-size: 18px;"&gt;&lt;span&gt;Claire Cochran, AHEAD -&amp;nbsp;&lt;font style="font-size: 16px;" color="#000000"&gt;This article originally appeared on &lt;a href="https://www.ahead.com/resources/nist-privacy-framework/" title="https://www.ahead.com/resources/nist-privacy-framework/"&gt;AHEAD's i/o blog&lt;/a&gt;&lt;/font&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#333333" face="Verdana"&gt;Security and privacy have long been considered “two peas in a pod,” but security is often the primary focus of the two. This is because it is possible to have a nearly perfect&amp;nbsp;&lt;em&gt;secure&lt;/em&gt;&amp;nbsp;system without worrying about privacy. (Imagine Fort Knox with nothing inside of it to protect.) However, it is impossible to have a privacy-centric system without any focus or worry about security principles and technologies. When you put the data first and truly understand what it is you’re protecting, you are able to scale security to make it commensurate to the data under protection.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;font color="#333333"&gt;After more than a decade of its Cybersecurity Framework (CSF), in January of 2020, the National Institute of Standards and Technology (NIST) spoke on the topic of privacy. The new and simply named&amp;nbsp;&lt;/font&gt;&lt;font color="#000000"&gt;&lt;a href="https://www.nist.gov/privacy-framework" target="_blank"&gt;&lt;font color="#0000FF"&gt;NIST&amp;nbsp;&lt;/font&gt;&lt;/a&gt;&lt;a href="https://www.nist.gov/privacy-framework" target="_blank"&gt;&lt;font color="#0000FF"&gt;Privacy Framework&lt;/font&gt;&lt;/a&gt;&lt;/font&gt;&lt;font color="#333333"&gt;&amp;nbsp;was created to complement the CSF and lays a foundation for early privacy program adopters to follow as they build out more comprehensive programs. According to NIST, the framework considers “privacy events as potential problems individuals could experience from system, product, or service operations with data, whether in digital or non-digital form, through a complete life cycle from data collection through disposal.” In other words, any form in which the data of an individual could become public in any way, causing harm. NIST further breaks down harm categories into the following areas: embarrassment or stigma, discrimination, economic loss, or physical harm.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#333333" face="Verdana"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/AHEAD_NISTimage.png" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#333333" face="Verdana"&gt;(source: NIST)&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#333333" face="Verdana"&gt;It helps businesses better identify, prioritize, and manage privacy risks to protect the privacy of individuals everywhere. It does this by closely mirroring the same approach as the CSF—CSF functions include: Identify, Protect, Respond, Recover; while the functions of the Privacy Framework are: Identify, Govern, Control, Communicate, Protect. The two clearly borrow from each other and overlap—showing how integral the two concepts are to mutual success.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#333333" face="Verdana"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/AHEAD_NISTimage2.png" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#333333" face="Verdana"&gt;(source: NIST)&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#333333" face="Verdana"&gt;Framework Structure and Use&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#333333" face="Verdana"&gt;Like the CSF, the Privacy Framework is made up of three parts: Core, Profiles, and Implementation Tiers. The Core is a set of activities and outcomes to help organizations begin to think and talk about their privacy risk. Its Profiles dive into the above-mentioned functions of Identify, Govern, Control, and Communicate. The Implementation Tier helps businesses understand whether they have the resources currently in place to manage privacy risk and achieve their goals.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana"&gt;&lt;font color="#333333"&gt;Any organization can use the framework to assess and reduce its privacy risk. In fact, NIST provides&amp;nbsp;&lt;/font&gt;&lt;a href="https://www.nist.gov/privacy-framework/hypothetical-use-cases" target="_blank"&gt;&lt;font color="#000000"&gt;&lt;font color="#0000FF"&gt;hypothetical use cases&lt;/font&gt;&lt;/font&gt;&lt;/a&gt;&lt;font color="#333333"&gt;&amp;nbsp;featuring both a large corporation and a small business to illustrate its implementation within various environments.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;font color="#333333" face="Verdana"&gt;So What Does This Mean for Businesses?&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#333333" face="Verdana"&gt;Privacy as an industry has long been complicated with compliance and legal regulations and standards with a lot of uncertainty around where regulatory boundaries start and end. There are also multiple industry and government regulations which have taken the spotlight in recent times—GDPR, HIPAA, CCPA, PIPEDA, FERPA—this list goes on and on. However, these existing (and often required) regulations are specific to certain industries, governments, and even geographical areas. NIST’s purpose when developing the Privacy Framework was to develop an industry-, geography-, and sector-agnostic approach that is readily available as a voluntary foundation to anyone who is interested in adopting it. It serves as a great starting point for organizations to use while developing basic, intermediate, and even advanced privacy programs.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10249105</link>
      <guid>https://www.technologyfirst.org/Tech-News/10249105</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Fri, 01 Jan 2021 19:51:44 GMT</pubDate>
      <title>Taking a Moment to Celebrate IT’s Response to the Pandemic</title>
      <description>&lt;p&gt;&lt;font color="#DD4A3A"&gt;&lt;span style="font-family: Verdana;"&gt;Thomas Skill,&amp;nbsp;&lt;/span&gt;&lt;span style=""&gt;Associate Provost &amp;amp; CIO,&amp;nbsp;&lt;/span&gt;&lt;span style=""&gt;University of Dayton and Technology First Board of Directors&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" color="#333333"&gt;For more reasons than most of us are prepared to count, 2020 was a year we would like to forget.&amp;nbsp; The struggles we faced with the global pandemic and the resulting personal and professional consequences of health-related protocols such as physical distancing forced major changes in the ways we work, learn, and gather. While none of us willingly signed up for this experience, there is a silver lining in the dark clouds of 2020 – and the IT industry should get some well-deserved credit for their contributions.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" color="#333333"&gt;Imagine for a moment what this pandemic would have been like if we did not have the Internet, videoconferencing and online learning tools?&amp;nbsp; Prior to the pandemic, just 3.4% of the US workforce were working remotely according to the US Bureau of the Census.&amp;nbsp; In April 2020, 51% of US workers were remotely doing their jobs (according to a recent Gallup study). &amp;nbsp;&amp;nbsp;What is so very remarkable is not just the sheer numbers, but also the incredible speed of this transition!&amp;nbsp; In many cases, this shift to remote working and teaching was almost an overnight event.&amp;nbsp; &amp;nbsp;For example, at the University of Dayton in March 2020, we moved over 3000 “on-premise” classes to “fully remote” in just 10 days – and that included training and supporting nearly 1000 faculty. These kinds of emergency transitions happened at schools and businesses across the nation.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" color="#333333"&gt;Many popular media stories are touting this pandemic as the catalyst for incredible technological innovations. However, from an IT perspective, I would contend that the &lt;strong&gt;&lt;em&gt;scaling of IT systems&lt;/em&gt;&lt;/strong&gt; and the &lt;strong&gt;&lt;em&gt;widespread adoption of remote engagement technologies&lt;/em&gt;&lt;/strong&gt; are our most significant accomplishments.&amp;nbsp; While not as important as the successful development of a vaccine, it does stand as a remarkable achievement in the social acceptance and diffusion of essential technologies.&amp;nbsp; This pandemic has dramatically transformed the ways that we work and teach – and the speed at which we saw the rapid adoption of video conferencing tools will very likely become an important case study in the effective diffusion of an innovation.&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" color="#333333"&gt;This is not a simple circumstance where videoconferencing has finally found its purpose.&amp;nbsp; We’ve had compelling use cases for this technology since it was introduced unsuccessfully in the early 1960s.&amp;nbsp; What we are witnessing today is the convergence of several mature technologies: Widely available high-speed Internet, ease-to-use software platforms, and standards-driven end-user devices (smartphones, tablets and computers). However, perhaps the two most important drivers are the favorable “economics of access” for most users (we can afford to be online for hours at a time) and the ready availability of IT support to help us solve those frequent technical problems (where would we be without tech support?).&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" color="#333333"&gt;As we look to 2021, the IT community can take great pride in having provided one of the few bright spots during this pandemic.&amp;nbsp;&amp;nbsp; However, we must keep in mind that much work remains.&amp;nbsp; Our heroic efforts were executed as “emergency solutions” to a crisis. Our rollout plans had many gaps in both security and equitable community access.&amp;nbsp; We were pressed to rapidly deploy VDI, VPNs and other security tools that pushed us beyond our traditional security “comfort zones.” &amp;nbsp;The genie of remote work is now out of the bottle and we will need to reconsider our practices for supporting this new home-based workforce.&amp;nbsp;&amp;nbsp;&amp;nbsp; The other major consideration is the ongoing “digital divide.” While access to high-speed Internet and computing tools has expanded greatly in recent years, there are significant gaps in both urban and rural areas of the US that are leaving families behind. &amp;nbsp;A recent Pew study reported that a significant number of families earning less than $30,000 annually do not have access to a reliable computer or an Internet connection.&amp;nbsp; A stunning 45% of those families had their children doing homework on a cellphone during the “study from home” days of the pandemic.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" color="#333333"&gt;Exploring and promoting secure and broadly accessible solutions to these ongoing challenges are what the IT community in Dayton embraces through our work at Technology First. &amp;nbsp;I’m looking forward to a post-pandemic 2021 when we can once again gather – and continue to collaborate – as we consider opportunities to support and grow IT in our community.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10249777</link>
      <guid>https://www.technologyfirst.org/Tech-News/10249777</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Fri, 01 Jan 2021 19:49:01 GMT</pubDate>
      <title>The Worst Things to Share on Social Media</title>
      <description>&lt;p&gt;&lt;font face="Verdana" color="#DD4A3A"&gt;&lt;font style="font-size: 18px;"&gt;&lt;a href="https://blog.cadre.net/author/tim-oconnor"&gt;&lt;font&gt;Tim O'Connor&lt;/font&gt;&lt;/a&gt;&lt;font&gt;, Manager, Knowledge Services (vCISO),&amp;nbsp;&lt;/font&gt;&lt;/font&gt;&lt;span style=""&gt;Cadre Information Security&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" style="font-size: 18px;" face="Verdana"&gt;As a business professional, why should you care what your employees post on social media?&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" style="font-size: 18px;" face="Verdana"&gt;Even before COVID-19 caused the mass migration to a remote workforce, many successful hacks into organizations originated from an employee’s personal device (e.g. cell phone, tablet, laptop) or from information leaked from a personal social media account. I am NOT suggesting that organizations play “big brother” and attempt to police the personal affairs of employees online, but I am going to make a case for education, awareness, and due care.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" style="font-size: 18px;" face="Verdana"&gt;While we can’t (and should not want to) dictate what our employees share about their personal lives on social media, we also can’t escape the fact that poor social media “hygiene” is a risk to the organization. Employees will forward emails between work and home accounts and use similar passwords for personal accounts and work accounts.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" style="font-size: 18px;" face="Verdana"&gt;The most effective way to mitigate the risk of users “taking malware to work” is a good Security Awareness Program designed with the help of a trusted advisor. In this article, we are going to cover a few of the worst kinds of behavior that your employees will hopefully avoid, once they receive proper training. When sharing this information it is critical to let the employees know that good social media hygiene helps protect not just the organization but also themselves, family, and friends. You may wish to convey the information in this article to your staff and partners.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;strong&gt;&lt;font color="#000000" style="font-size: 18px;" face="Verdana"&gt;It’s All Fun and Games Until Someone Gets Hacked&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" style="font-size: 18px;" face="Verdana"&gt;Games are fun and one of the attractions of social media is sharing personal trivia with friends and family. I am not going to ask you to stop playing games, but it is important to recognize that some of the games on social media have been designed by evil hackers.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" style="font-size: 18px;" face="Verdana"&gt;Many of these games look innocent and don’t SEEM to give away any information to hackers, but hackers are a crafty lot. Many of these games, like the popular “what is your elf name”, ask for your birthdate or a part of your name as part of the process. Others ask about your favorite pet or your phone number. What could be wrong with these games?&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" style="font-size: 18px;" face="Verdana"&gt;The way it works is that evil hackers simply reverse your post to find out pieces of your birthday, phone number, and/or favorite things (people often use favorite things like pet names as passwords). After you answer one or more of these quizzes, enough of a profile is built to allow the evil hacker to guess likely passwords or forms of authentication such as the last digits of your phone number. With this information, for instance, they could steal your pharmacy prescription:&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font style="font-size: 18px;" face="Verdana"&gt;&lt;font color="#000000"&gt;A legitimate question upon seeing the hackers game shown here is, “why would knowing only the last two digits of my phone number be a risk?” The answer is that knowing this is a gold mine to a mentalist or an evil hacker as this reduces the possible remaining numbers to a manageable sum. The evil hacker can use another game or source to get the other digits or might just use them to CONFIRM other information that can be found publicly as they build a profile on you. In the social media post above, we found people even offering up remaining digits as part of the fun of the game. You can find out more about the “Elf Name” hacks and the relationship of mentalism to Social Engineering&lt;/font&gt; &lt;u&gt;&lt;font color="#205D9E"&gt;here&lt;/font&gt;&lt;/u&gt;&lt;font color="#000000"&gt;.&lt;/font&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;strong&gt;&lt;font color="#000000" style="font-size: 18px;" face="Verdana"&gt;What is Amen farming and what harm could it possibly do?&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" style="font-size: 18px;" face="Verdana"&gt;“Amen Farming”, also known as “Like Farming”, is a social media hack that tries to compel people to quickly post a one-word comment about a compelling subject. On the surface, it would seem that this is no different than sharing any other meme and making a comment. It turns out on further examination though that this is a powerful psychological tool that can exploit the privacy settings of respondents.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" style="font-size: 18px;" face="Verdana"&gt;As a security professional, I am extremely fascinated by the many ways Amen Farming can be exploited. I ALMOST don’t want to warn my friends just so that I can track the methodology of the hack. There are almost a dozen ways these posts can assist evil social media hackers. The first is that many more people will respond to these one-word memes than would respond to a regular discussion. When a long chain of shares and comments are built, this allows the original posting account to mine information from the replies that would normally be blocked by privacy settings. We don’t know all the ways this information can help evil hackers but we do know it assists them in profiling accounts and building up the reputation of an account that they will later use for friend invites and misinformation campaigns.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" style="font-size: 18px;" face="Verdana"&gt;This practice has become such a gold mine for evil hackers that they often don’t even bother to make up their own memes. They just find a popular one and photoshop “say amen” or another phrase into the meme graphic as in this example.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" style="font-size: 18px;" face="Verdana"&gt;The best thing to do is to NOT SHARE these memes and of course don’t type “amen”. When you see someone sharing these kinds of memes let them know it might be a scam and point them to this article or the one from “That’s Nonsense”: (https://www.thatsnonsense.com/facebook-like-share-photo-scams-dont-make-scammers-rich/).&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" style="font-size: 18px;" face="Verdana"&gt;If you MUST share the meme, don’t share it from the original account. Download the graphic and then reshare it as your own content and also make sure your social media privacy settings are set to “friends only”.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;strong&gt;&lt;font color="#000000" style="font-size: 18px;" face="Verdana"&gt;Fact-Checking Hoaxes&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" style="font-size: 18px;" face="Verdana"&gt;If you are reading this article I suspect you already know that spreading hoaxes on social media is a bad thing and should be avoided. Therefore, I won’t be going into much detail but I would be remiss if I did not include this in our list.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" style="font-size: 18px;" face="Verdana"&gt;An interesting new development in the “fake news” wars is that scammers are now doing their best to discredit fact-checking outlets. This makes perfect sense as the ploy to “shoot the messenger” goes back long before social media. You should not take the word of a fact-checker until you verify the contents of the article and the sources used for fact-checking. While statistics show only a very small number of fact-checking articles from well-known sites ‘get it wrong,’ it still can happen. In practice, however, it seems hard to get your crazy uncle to do ANY fact-checking much less use additional due diligence. For yourself, some fact-checking is better than none and I would urge you to read the entire write-up from the fact-checker.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" style="font-size: 18px;" face="Verdana"&gt;If your crazy uncle does not believe any fact-checkers, try going to the sources in the fact-checker article and posting those directly.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;strong&gt;&lt;font color="#000000" style="font-size: 18px;" face="Verdana"&gt;“Watch Out For This Hacker” Warnings&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" style="font-size: 18px;" face="Verdana"&gt;Several times a year instant messaging hacks show up warning people to not befriend some ‘famous’ evil hacker. A recent example is the “friend request from Jayden K. Smith” hoax. Since Jayden K. Smith is not a real person and she won’t actually send anyone a friend request, what is the harm?&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" style="font-size: 18px;" face="Verdana"&gt;The harm from these kinds of messaging scams is similar in some ways to Amen Farming. The evil hackers are building profiles and networks and as an aside, they are helping to muddy the water and discredit real notifications about social engineering. The principal difference is the media used, in this case, instant messaging services.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;strong&gt;&lt;font color="#000000" style="font-size: 18px;" face="Verdana"&gt;Accidental Information Leakage in Social Media&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" style="font-size: 18px;" face="Verdana"&gt;Never post your phone number, address, age, or passwords on social media. While I think most of us know that, you should know that this information can easily be shared inadvertently, often through photos.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" style="font-size: 18px;" face="Verdana"&gt;A good example happened last year when a photo of a government emergency worker was posted but on the monitor behind him was a post-it note with a government network password.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" style="font-size: 18px;" face="Verdana"&gt;Now that many of us are working from home, this kind of information leakage becomes much more common. Check to make sure any photos you post do not include shots of the desk where papers might be in sight or calendars on the wall. When you post a photo of that new item that just arrived in the mail, can you see your mailing address?&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" style="font-size: 18px;" face="Verdana"&gt;Screenshots are particularly dangerous and should be examined and edited closely before sharing. Many people now use multiple monitors at home and don’t realize that a screenshot includes BOTH screens. Screenshots from phones and tablets are also possible sources of information leakage.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;strong&gt;&lt;font color="#000000" style="font-size: 18px;" face="Verdana"&gt;Knowledge is Power&lt;/font&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" style="font-size: 18px;" face="Verdana"&gt;I hope this article has helped you to become aware of some of the top common exploits that happen with social media sharing and that you will pass this information on to others.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" style="font-size: 18px;" face="Verdana"&gt;If your organization would like help in developing policies, Security Awareness Programs, or other related issues please let us know. We have lots of services, workshops, webinars, and direct help to you.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10249776</link>
      <guid>https://www.technologyfirst.org/Tech-News/10249776</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Fri, 01 Jan 2021 19:46:40 GMT</pubDate>
      <title>A Special Thank You to Steve Hangen</title>
      <description>&lt;p&gt;&lt;font style="font-size: 18px;" face="Verdana" color="#DD4A3A"&gt;&lt;font style=""&gt;Paul Moorman,&amp;nbsp;&lt;/font&gt;&lt;span style=""&gt;Technology First Board of Directors&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;" face="Verdana"&gt;We wish our dear friend Steve Hangen the very best as he transitions to a well-deserved retirement after a remarkable career in Information Technology, leading teams at some of the Dayton region’s largest and best-known companies including NCR, Reynolds and Reynolds, WinWholesale (now WinSupply), and Mike-Sell’s.&amp;nbsp; We asked folks who knew him well to provide us with some recollections, and the words that flowed back included “admire, smile, leadership, consummate professional, consistent, calm, supported, mentor, wisdom and quiet confidence.”&amp;nbsp; He will be remembered above all for his caring and helping of others.&amp;nbsp; Steve wrote on his LinkedIn page that “the biggest blessing of my career has been the fantastic people that I have been privileged to work with across the years!”&amp;nbsp; Steve, the privilege has truly been ours.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;" face="Verdana"&gt;Ryan Kean, Kroger’s VP of Technical Strategy and Architecture, recalls Steve’s leadership style with the quote, “I had the opportunity to work in Steve’s organization at Reynolds and Reynolds.&amp;nbsp; He was very consistent in his communication and leadership.&amp;nbsp; He was calm, clear, and cared for his teammates.”&amp;nbsp; Don Kennedy, Practice Lead at Smart Data, adds, “I admire not only his “professionalism with a smile” manner but also how he has attracted and retained IT talent around him over the years as well as his ability to give back to our community with his time.”&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;" face="Verdana"&gt;Steve was a guiding light for over sixteen years and one of the most important change leaders for Technology First, volunteering as Vice-Chair and Board Chair, serving many years on the Executive Committee and Board of Directors.&amp;nbsp; He was personally responsible for revamping the CIO Council into an attendee-driven group that delivers relevant, timely information and assistance to local IT leaders, and his is the format that all Special Interest Groups (SIGs) follow to this day.&amp;nbsp; His impact is best spoken in the following words from his peers.&amp;nbsp;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;" face="Verdana"&gt;Jim Bradley, VP of Information Technology at Tecomet, sums it up with, “Steve has been the consummate professional and a huge contributor to both Technology First and to me personally.&amp;nbsp; He modeled the CIO Council to make it what it is today, and countless IT Leaders have learned much through the years because of what he established and developed.&amp;nbsp; Steve also taught us all the value of peer connections and relationships.”&amp;nbsp; Bryan and Barbara Hogan, owners of Afidence, chime in with “Your work and leadership have truly built something that will stand the test-of-time!”&amp;nbsp;&amp;nbsp; John Huelsman, IT Director at Hobart Services, relays, “Steve’s been a mentor for me for many years both professionally and personally.&amp;nbsp; His wisdom, experience, and quiet confidence inspire me to this day.&amp;nbsp; He has impacted me in profound ways through the years and I will be forever in his debt.”&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;" face="Verdana"&gt;To our friend, all our best, and we hope our paths cross again soon as you continue to mentor our IT community in a new way!&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font style="font-size: 18px;" face="Verdana"&gt;&lt;img src="https://www.technologyfirst.org/resources/Pictures/Blog/Steve%20Hangen,%20Super%20IT%20Leader%20Spotlight.png" alt="" title="" border="0"&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10249774</link>
      <guid>https://www.technologyfirst.org/Tech-News/10249774</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Fri, 01 Jan 2021 19:39:05 GMT</pubDate>
      <title>A note from Technology First</title>
      <description>&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;strong&gt;&lt;font color="#DD4A3A"&gt;Melissa Cutcher,&amp;nbsp;&lt;/font&gt;&lt;/strong&gt;&lt;strong&gt;&lt;font color="#DD4A3A"&gt;Executive Director, Technology First&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Dear Friends,&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;2020 has been the year of “you’re on mute”, “I forgot my mask” and wine with DeWine. I am grateful to close chapter 2020 and welcome 2021 with a great big socially distanced hug! 2020 wasn’t all bad. It’s been an outstanding learning experience for me both personally and professionally. I had the opportunity to meet Steve Hangen, Ann Gallaher, and many other great IT thought leaders in our region. Each one has demonstrated great leadership and grace during a year of stress, confusion, and uncertainty.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;As an organization, Technology First faced our own unique challenges. Pivoting from all in-person events, like SIG’s, Board and CIO meetings, to all virtual by April was no small task. In November, we produced our first virtual conference, Taste of IT. We hosted speakers and attendees from all around the United States! We will continue hosting events virtually until the Governor says we can go back to in-person. Until then, I look forward to “seeing” you at the next Technology First event.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;We have great plans for 2021! Look for:&lt;/font&gt;&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;§&lt;font&gt;&amp;nbsp;&lt;/font&gt; &lt;font&gt;Two new special interest groups: developers and cybersecurity&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;§&lt;font&gt;&amp;nbsp;&lt;/font&gt; &lt;font&gt;The Technology First web site will have a new look and updated features for our members&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;§&lt;font&gt;&amp;nbsp;&lt;/font&gt; &lt;font&gt;Expansion of our workforce development efforts&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;

  &lt;li&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;§&lt;font&gt;&amp;nbsp;&lt;/font&gt; &lt;font&gt;Continuation of building partnerships with other associations such as, The Circuit, Ohio-X, Ohio IT Association, SOCHE, DDC, JobsOhio and Dayton Area Chamber of Commerce&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;&lt;font&gt;The vision of Technology First is to develop our region’s future by&lt;/font&gt; &lt;strong&gt;&lt;font&gt;engaging, expanding, and connecting the IT community&lt;/font&gt;&lt;/strong&gt;&lt;font&gt;. We plan to accomplish this vision by&lt;/font&gt; &lt;strong&gt;&lt;font&gt;being the conduit for IT advancement in the region.&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;Yes, 2020 was a challenge. But as a community, we are stronger, because we are together! We have virtually, gone into each other’s homes, connected on a deeper, more personal level seeing each other’s workspaces, meeting family members, both two and four legs.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;If you haven’t already, get involved in Technology First. Join us on social media, sign up for the newsletter and event email lists, make a donation before the year ends, volunteer at an event, and respond to our latest workforce survey.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font face="Verdana" style="font-size: 18px;"&gt;2021 – here we come!&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10249770</link>
      <guid>https://www.technologyfirst.org/Tech-News/10249770</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Fri, 01 Jan 2021 18:11:50 GMT</pubDate>
      <title>Getting to Know You</title>
      <description>&lt;p style="line-height: 16px;"&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#DD4A3A" style="font-size: 18px;"&gt;&lt;font face="Verdana, sans-serif"&gt;Mardi Humphreys, Change Agent,&amp;nbsp;&lt;/font&gt;&lt;span style=""&gt;Rainbow Data Systems, Inc. &amp;amp; Integration Edge&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" face="Verdana, sans-serif" style="font-size: 18px;"&gt;I’ve disappointed Rick Springfield. He told me not to talk to strangers, but I lean more toward young Forrest Gump’s philosophy of business development. Remember the first time he got on the bus to school? There are plenty of services that allow your sales team to send hundreds of emails extolling the virtues of your products/services to strangers. There are even companies with the technology to make hundreds of cold calls for you and when the prospect answers the phone, transfer the call to a sales rep waiting to pitch. I’m usually a big fan of automation, but why would a company reveal their pain points to you when they don’t know, like, or trust you yet? This is why Relationship Marketing is so important.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font style="font-size: 18px;"&gt;&lt;strong&gt;&lt;font color="#000000" face="Verdana, sans-serif"&gt;What Is It?&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" face="Verdana, sans-serif" style="font-size: 18px;"&gt;Relationship Marketing is simply building long-term, trusting relationships with strangers; essentially, developing clients into friends. When your friends face challenges, you want to be the first person they contact for a solution. You should feel the same way about your clients. People need to know you’re authentic in order to trust you. You must be the same person to your clients as you are to your cousins. Unless you’re Tom Hanks, you can’t act like different people in your relationships. Being inauthentic is exhausting and counterproductive.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font style="font-size: 18px;"&gt;&lt;strong&gt;&lt;font color="#000000" face="Verdana, sans-serif"&gt;How Does It Work?&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" face="Verdana, sans-serif" style="font-size: 18px;"&gt;Mom is right. If you want to make a friend, be a friend. Take the initiative. Network. Communicate. Be curious. Provide value without an agenda. Businesses are run by people. Go where the people are. Get personal. Do your homework. There is so much information at your fingertips (e.g., company websites, LinkedIn, business newspapers/websites), find out what their business does and their role in it. Figure out how you can help. The companies you want to partner with need revenue to survive. How can your company help them either attract customers or save money on their operations? Do they have a problem your company doesn’t fix? Do you know someone who does? Introduce them. While this doesn’t bring you revenue now, proving you want what’s best for their business demonstrates you can be trusted to put their interests before your own. Having a mindset of their success means your success. We get further together than we do on our own.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font style="font-size: 18px;"&gt;&lt;strong&gt;&lt;font color="#000000" face="Verdana, sans-serif"&gt;Why Does It Work?&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" face="Verdana, sans-serif" style="font-size: 18px;"&gt;Giving your clients great experiences differentiates your company from your competition. You have to go beyond persuading them to believe in your brand. Your clients want to be seen. They want you to help them solve their unique issues. They want to give you permission to be on their team. They do not want content forced on them. They want to learn what your company has to offer and what you can do for them in their own time using the communication channels they favor. I can’t think of one business owner who enjoys having their day interrupted by a cold sales call or sifting through all the cold emails they receive daily. However, I can think of several who appreciated a congratulations-on-your-latest-success LinkedIn message.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10249313</link>
      <guid>https://www.technologyfirst.org/Tech-News/10249313</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Fri, 01 Jan 2021 18:02:27 GMT</pubDate>
      <title>Technology First / Info-Tech Research Partnership</title>
      <description>&lt;p style="line-height: 16px;"&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font face="Verdana, sans-serif" color="#DD4A3A" style="font-size: 18px;"&gt;To provide additional resources for our members, we have formed a new Partnership with Info-Tech Research Group.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font style="font-size: 18px;"&gt;&lt;strong&gt;&lt;font color="#000000" face="Verdana, sans-serif"&gt;Through this relationship, Info-Tech is offering our community complimentary access to specific research and services as an additional benefit to members of Technology First.&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" face="Verdana, sans-serif" style="font-size: 18px;"&gt;Info-Tech Research Group produces unbiased and highly relevant research to help CIOs and IT leaders make strategic, timely, and well-informed decisions. Partnering closely with your IT teams, they provide everything from actionable tools to analyst guidance.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" face="Verdana, sans-serif" style="font-size: 18px;"&gt;This month’s exclusive content for Technology First Members includes:&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" face="Verdana, sans-serif" style="font-size: 18px;"&gt;Benchmarking&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" face="Verdana, sans-serif" style="font-size: 18px;"&gt;2021 Tech Trends&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" face="Verdana, sans-serif" style="font-size: 18px;"&gt;Disaster Recovery&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font style="font-size: 18px;"&gt;&lt;font color="#000000" face="Verdana, sans-serif"&gt;Ensure your IT team delivers measurable results for your organization.&lt;/font&gt; &lt;u&gt;&lt;font color="#205D9E" face="Verdana, sans-serif"&gt;Explore these new complimentary resources for your team here!&lt;/font&gt;&lt;/u&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font style="font-size: 18px;"&gt;&lt;strong&gt;&lt;font color="#000000" face="Verdana, sans-serif"&gt;What should you do next?&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font style="font-size: 18px;"&gt;&lt;strong&gt;&lt;font color="#000000" face="Verdana, sans-serif"&gt;Technology First is participating in an association-wide benchmarking program.&lt;/font&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font style="font-size: 18px;"&gt;&lt;strong&gt;&lt;em&gt;&lt;font color="#000000" face="Verdana, sans-serif"&gt;CIO Business Vision Diagnostic&lt;/font&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" face="Verdana, sans-serif" style="font-size: 18px;"&gt;Value: 6k – Complimentary for Technology First members!&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" face="Verdana, sans-serif" style="font-size: 18px;"&gt;The most important thing an IT leader can do is understand the business' needs and actively measure that the business is satisfied.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" face="Verdana, sans-serif" style="font-size: 18px;"&gt;Stakeholder management is a critical aspect of running a successful IT department.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font color="#000000" face="Verdana, sans-serif" style="font-size: 18px;"&gt;Info-Tech's CIO Business Vision program is a low effort, high impact program that will give you detailed report cards on the organization's satisfaction with IT’s core services.&lt;/font&gt;&lt;/p&gt;

&lt;p style="line-height: 16px;"&gt;&lt;font style="font-size: 18px;"&gt;&lt;font color="#000000" face="Verdana, sans-serif"&gt;Use these insights to understand your key business stakeholders, find out what is important to them, and improve your interactions.&lt;/font&gt; &lt;u&gt;&lt;font color="#205D9E" face="Verdana, sans-serif"&gt;View a sample report and begin the diagnostic through our partnership page!&lt;/font&gt;&lt;/u&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.technologyfirst.org/Tech-News/10249291</link>
      <guid>https://www.technologyfirst.org/Tech-News/10249291</guid>
      <dc:creator />
    </item>
  </channel>
</rss>