Season 1

Vendor Management and Cybersecurity
View episode

Cybersecurity has many facets, and not everyone is familiar with the ins and outs of it. What’s more, it may surprise people to learn that much of cybersecurity does not directly involve technology. As tech advances, new ways to address cybersecurity needs with the help of vendor management emerges. How do these advancements come together […]

sustainability in IT
View episode

IT and sustainability aren’t often two words seen together, but they should be. As the world heats up, it’s not only becoming more important for buyers to see environmental, social, and governance (ESG) initiatives in the products they’re purchasing, but it’s also great for the planet. Where should you start? On the latest episode of […]

View episode

If you’re a Jira 100-200 service level user, look no further! Migrating your ITSM operation from on-premise to the cloud can be a daunting task. But with the right knowledge, it shouldn’t be. So, how exactly should you go about migrating to a cloud ITSM platform, and what are some red flags to look out […]

Data Center Management
View episode

There used to be a time when all of a company’s data centers were within the same building, always in a room chock full of different devices with heat emanating from within. It was usually very expensive and complex, and often included a host of complications and safety hazards. With the advent of technology, […]

Growth Pains: Standardizing Process and Procedures for a Robust IT Asset Management Program
View episode

In this episode of the Hitchhiker’s Guide to IT Podcast, host Michelle Dawn Mooney discusses the challenges and strategies for building a robust IT Asset Management (ITAM) program with special guest Ian Silver, the ITAM manager for the Flynn Group of Companies. They delve into the definition of ITAM, which involves managing technology assets throughout […]

Navigating the Complications of Cloud Security
View episode

Businesses worldwide are grappling with the need for robust cloud security. The COVID-19 pandemic has accelerated the transition to cloud computing services, leading to aninflux of cybersecurity threats. Today, businesses must navigate the complexities of vendor management concerning their cloud security obligations. Data from Risk Based Security suggests that data breaches exposed 36 billion records […]