Podcast: Staying Resilient During the Tech Industry Turmoil

Avatar photo
Conor Quinlan

Episode Summary

Tech layoffs and banking failures have made the headlines recently. In this episode we cover how people in Silicon Valley and beyond can stay resilient in the face of stress. The episode first explores the human perspective of resilience on the ground with Vivian Lee, a guest from Airiam located in the Silicon Valley area.

The perspective of the discussion then expands, and we give tips for how companies around the country can best respond to the ripple effects of the turmoil.

Topics covered includes:

    • Make sure you review your technology and financial partners thoroughly.
    • Plan for resilience by having redundancy in critical areas.
    • Don’t fall for phishing emails related to banking changes or other hot topic issues.
    • If you do need to let people go, handle it thoughtfully and securely.

Video Version

Listen to more episodes at www.airiam.com/podcast, on Spotify, Apple Podcasts, Google Podcasts, Amazon Music, and other podcast platforms.

New Resources In Your Inbox

Get our latest cybersecurity resources, content, tips and trends.

Other resources that might be of interest to you.

Podcast: Resilience While Recording

 Episode Summary Anything can happen when you’re recording! From webinars to podcasts, Art Ocain and Vivian Lee know best about random mistakes and accidents when you’re trying to get the perfect audio and video. What can you do to prevent these
Vivian Lee
>>Read More

Building Cyber-Resilient Teams: 14 Strategies for Business Leaders

Cyber threats are on the rise, and it’s impossible to stay off bad actors’ radars. You can’t run, and you can’t hide, but you can build cyber-resilient teams ready to anticipate, withstand, and recover from cyber incidents. While technology plays an im
Vivian Lee
>>Read More

What Is a Zero-Trust Security Model (and Why We Use It)

Traditional perimeter security is dead. The castle-and-moat approach assumes everything inside your network is safe, but that assumption gets exploited daily. Attackers breach the perimeter, then move freely across your systems until the damage is done
Jesse Sumrak
>>Read More