Artwork for podcast Las Vegas IT Management
Cybersecurity Challenges & Solutions: How to Stay Protected in a Digital World
Episode 254th March 2025 • Las Vegas IT Management • K&B Communications
00:00:00 00:36:30

Share Episode

Shownotes

In this episode, IT expert and veteran Craig Turner shares his journey into the tech industry, exploring the evolution of technology, cybersecurity challenges, and AI’s impact on modern infrastructure. He also highlights the importance of compliance in the gaming industry and offers valuable advice for aspiring IT professionals.

Transcripts

Speaker:

It's like taking a shower, right?

2

:

You don't take a shower and you smell good for the rest of your life, right?

3

:

If you keep taking a shower.

4

:

So it's kind of that thing is wash, rinse, repeat, right?

5

:

Remind yourself, re-motivate yourself and look at things.

6

:

Hey, can we do this better?

7

:

Right.

8

:

As I like to say is like, let's get the OK, let's get the good, let's get the gooder and

then let's get the best.

9

:

Right.

10

:

Do you ever achieve fast?

11

:

Probably not.

12

:

But we don't want to let perfect get in the way of good.

13

:

So welcome to the Las Vegas IT management.

14

:

My name is Shay Toya.

15

:

I'm super excited to be interviewing Craig Turner with Penn Entertainment, who is also a

veteran.

16

:

How are you doing today, Craig?

17

:

Hanging in there, okay.

18

:

So we're gonna go ahead and just learn a little bit more about you.

19

:

I would love to get to know how did you become an IT professional?

20

:

Well, it started in the actually.

21

:

Back in 1996, I enlisted in the Navy.

22

:

Wasn't quite sure what I wanted to do with my life.

23

:

Up to that point, I thought I would be a professional tennis player.

24

:

That never happened.

25

:

So enlisted in the Navy and they had some requirements for cryptologist, technician,

communications, and it sounded fun.

26

:

so I went to school and then last semester, we found a home.

27

:

and then I'm gonna go on and the results.

28

:

I know that's pretty cool.

29

:

So you were, I guess your plan, we all have plans, was to become, how long did you play

tennis for?

30

:

I started playing tennis around 13.

31

:

I really got into it.

32

:

My baseball career didn't go as well as I thought it would.

33

:

So I played up until I graduated high school, kind of stepped away from the sport for a

while and then got back into it recreationally.

34

:

And then spent some time trying, you know, teaching and stuff like that.

35

:

So technically, I guess you could say I was a professional for a short lived time, but

yeah, it's.

36

:

I still love the sport.

37

:

Got some great people.

38

:

Gave a sport.

39

:

It's fun.

40

:

IT, if you won't pay the bills.

41

:

Got it, I totally understand.

42

:

There was a time, a long, long time ago where I was all into basketball, so I get it.

43

:

And then, you you did share with us, you got into the army, you went to school.

44

:

Was there a reason you chose the IT field?

45

:

Was it just due to the army or military, or I guess what kind of happened with that?

46

:

Well, it was the Navy and they didn't call it when I joined.

47

:

Right.

48

:

I.T.

49

:

was really in its infancy.

50

:

At my age, you know, we were getting AOL desks sent to the house.

51

:

And so and quite honestly, you know, the Navy was trying to transition and not sure what

to call it.

52

:

And so when I first came in, you know, the I.T.

53

:

rate, if you will, were called radio manning.

54

:

Right.

55

:

And so communication was, you know, the core competency that they wanted.

56

:

And so they transitioned to into IT probably early 2000s, if you will.

57

:

And so they understood that there was a gap and there's a skill set that we need across

the services.

58

:

And so they started leveraging commercial software and some of the companies and

organizations that were really pushing

59

:

the needle, if you will, on the technology.

60

:

And so the Navy's like, we need you to learn this.

61

:

You go to school and read books and, you know, learn it, you know.

62

:

So there was no Google, there was no internet to to troubleshoot stuff or learn how to do

stuff.

63

:

There was no YouTube or anything like that.

64

:

So you had to go buy books.

65

:

had to go.

66

:

Hopefully you got on a distribution for CDs, but three, you know.

67

:

Bunch of bunch of bunch of bunch of tax files and stuff.

68

:

Yeah, been a journey.

69

:

and I'm sure it became easier because before you had to do the research through books and

stuff like that.

70

:

So I'm sure it's became a lot easier to do so.

71

:

That was too much

72

:

Yeah, yeah, very.

73

:

And then so you talked about communications, you know, got, guess, what are some of the

most challenging IT projects, you know, with being in the Navy, have you worked on and how

74

:

did you overcome them?

75

:

The most challenging projects?

76

:

my gosh.

77

:

Messaging is the biggest, one of the biggest services like military users, know, maybe do

a whole lot.

78

:

And so learning how mail, you know, traverses the interwebs, if you will, right?

79

:

Understanding that technology, you know, how it's hosted and stuff like that.

80

:

And then, you know, securing it.

81

:

That was the other piece, right?

82

:

Cyber security didn't exist, right?

83

:

No one knew what was going on.

84

:

You know, we encrypted our traffic through, you know, a lot of legacy World War II Vietnam

era technology, right?

85

:

And we thought that was the place.

86

:

So I think.

87

:

In my Navy career, that was one of the biggest challenges, right?

88

:

And understanding you go from semi-climate bottom circuits to, you know, line of sight.

89

:

SHF circuits and troubleshooting and learning that.

90

:

And the next thing you know, it's like, all right, sit down at this computer and you send

an email, right?

91

:

Understanding how that works and being able to troubleshoot it and come to find out it's

two servers that support a whole, you know, the story squadron or a whole fleet, right?

92

:

And, you know, those servers overheat or reboot or whatever, like, you know, it was I'm

not saying catastrophic, but you got phone calls really quickly of what's going on here.

93

:

know, so.

94

:

That was probably one of the biggest challenges.

95

:

then just as my career progressed, right, you're learning more technology and more in the

scale of it.

96

:

You know, in most organizations right now, from an IT perspective, you know, they're

supporting one office building, maybe a handful or what have you.

97

:

Yeah, they're enterprise.

98

:

But in the military and in service, you're supporting hundreds of thousands of service

members and a whole

99

:

region, right?

100

:

Like, so the scale of it is they can't just turn stuff on and on and reboot it and see if

it works.

101

:

Like, it can be very catastrophic.

102

:

and sounds very stressful at times.

103

:

Thank you for sharing that, Craig.

104

:

I do appreciate it.

105

:

And when it comes to the, because I know one of the things you didn't mention before I ask

you my other question, you said in the past, like cyber security, cyber attacks, unless I

106

:

heard you wrong, wasn't really a thing.

107

:

I guess when or what or how did it become a thing?

108

:

I think the leaders in the industry, if you will, right, got together with the Department

of Defense.

109

:

And that's what the Department of Defense does is every day things like, where are our

threats?

110

:

How do we address these threats?

111

:

They have a plan A, B, C, and D.

112

:

And if those don't work, then they have another book and say, all right, we'll do FGH.

113

:

And so here you have these new capabilities.

114

:

And of course, military leaders, industry leaders, right?

115

:

Like how do you protect?

116

:

Right.

117

:

And so what are the skill set you need, you know, all this other stuff.

118

:

So they work closely with, you know, the Microsoft's or the world, IBM's of the world, you

know, Google came out, you know, so all these things were coming about, you know, like,

119

:

all right, these are great technologies.

120

:

These are great features and services that we can leverage.

121

:

How do we protect it?

122

:

And so.

123

:

Well, it's made it a priority, right?

124

:

You know, they're trying to I'm sure they they spent weeks coming up with a cool guy

named, you know, call it right.

125

:

And then it's like, all right, we got a cool guy named.

126

:

Now, how do we address this grow our services and our fleet?

127

:

Right.

128

:

What curriculum and training do they need?

129

:

What specialized training do they need?

130

:

And stuff such work like that.

131

:

Right.

132

:

And so that.

133

:

I would say that came right around.

134

:

I don't know, 2002, three or error.

135

:

time frame is when they're like, all right, we need some skill sets and resources to start

addressing these things.

136

:

And so, you know, the CompTIA Security Plus didn't exist, right?

137

:

You know, all these cybersecurity sort of patients and education that you have now didn't

exist, right?

138

:

And so the military was putting together these brick lumps and saying, know, learn this

stuff.

139

:

you know, it was good training in the beginning, right?

140

:

And so I think that's what kind of mushroomed into this

141

:

this whole industry now.

142

:

Yeah, and I see that like how much time can change just in 20 years.

143

:

It's just crazy to say that 2003 was 24, I guess more than 20 years ago and just the

changes that we've gone through.

144

:

And so how do you guys really, how do you ensure that the infrastructure aligns with

business objections at Pinnant Entertainment?

145

:

That's the million dollar question, It is you want to protect the organization and but

also the organization needs to make money at the end of the day, right?

146

:

Like they, you whatever their mission is or in fact, in France, got to support them in a

way that doesn't impede, right?

147

:

But also protect the organization.

148

:

So it's definitely a dance, right?

149

:

Whether you call it the waltz or, you know, swing dance, right?

150

:

It's definitely a dance.

151

:

And so I think

152

:

You know, it's not just the organization itself, right?

153

:

And these governing bodies, whether it's gaming control boards or PCI, right?

154

:

You know, the credit bureaus and the banks.

155

:

Right.

156

:

And so it.

157

:

How do I say this?

158

:

Like they only, the, the malicious actors don't have to be right once we have to be right

all the time.

159

:

So it's a difficult dance and we have this like tiered approach of really trying to

protect the organization.

160

:

Right.

161

:

And then there's sometimes there's a cost factor, right?

162

:

Like it's like, you don't have millions and millions of dollars and millions of millions

of resources to implement solutions and stuff like that.

163

:

Right.

164

:

So you, sometimes it's just that.

165

:

It's a leadership policy to protect this information, right?

166

:

This is how we're to do things until XYZ is happening.

167

:

so, and it's definitely collaborative, right?

168

:

You can't just expect the cyber security analysts to plug all the holes and protect

everything, right?

169

:

There's the scale of it is just too much, right?

170

:

So you have to work together.

171

:

You know, your service desk, your infrastructure team, your DevOps team, your engineering

team, right?

172

:

I like to say it's like we're all reading the same book, but it seems like we're on

different chapters.

173

:

And so it's trying to get these teams to start collaborating more, working together more,

and as I call it, not run with scissors.

174

:

And so that's really, in my background, in my history, in my honest opinion, that's really

like the only way you can really address a lot of these risks and know, and...

175

:

contacting the organization.

176

:

A lot of it's just sweat equity, rolling up the sleeves and know, and go to work.

177

:

There's no silver bullet out.

178

:

No, never, never at all.

179

:

And so what are some of the ways that you work with a team with your team to make sure

that they're following the policies when it comes to these risk factors?

180

:

they're copious and copious amounts of audit, right?

181

:

you know, you have different types of audits, right?

182

:

To make sure, you know, we're not getting kicked in the teeth.

183

:

We're not paying fines or, you know, we're protecting this and type of thing.

184

:

The other thing is you have tools in place to help you remind yourself, right?

185

:

Like we're all human.

186

:

So you put process in place and you manage that process, right?

187

:

And you lead the people and say like,

188

:

these are the policies, right?

189

:

And let's manage these processes so that we're not having a bad day or a long weekend,

right?

190

:

And so, and you do your due diligence, right?

191

:

You do the legwork upfront, have to put in notifications, alerts and everything like that.

192

:

it's kind of one of those things, it's like taking a shower, right?

193

:

You don't take a shower and you smell good for the rest of your life, right?

194

:

If you keep taking a shower.

195

:

It's kind of that thing is wash, rinse, repeat, right?

196

:

Remind yourself, re-motivate yourself and look at things.

197

:

Hey, can we do this better?

198

:

As I like to say is like, let's get the OK, let's get the good, let's get the gooder and

then let's get the best, right?

199

:

Do you ever achieve best?

200

:

Probably not.

201

:

But we don't want to let perfect get in the way of good.

202

:

And so and sometimes, you know, you can come back to goodness like, all right, you know, I

have a little bit more energy, you know, let me see if I can make it better.

203

:

And so that's

204

:

the mentality that you try to implement between all those teams, right?

205

:

And so not one person is going to know everything about everything, right?

206

:

And so, you know, you might be the hero on Tuesday and then next thing you know, Tim on

another team is the hero, right?

207

:

So that's the kind of mentality and collaboration and camaraderie you need to, you know,

product your organization and just kind of implement those strategies.

208

:

And from just from what you've told me so far, I can see the importance of that.

209

:

And so one of the biggest topics lately that we've been talking about just the last few

weeks, few months is AI.

210

:

And so what role does automation play in modern IT infrastructure and how do you leverage

it in your work?

211

:

So AI is the new kid on the block, right?

212

:

It's the shiny new tool.

213

:

I think it could provide organizations with minus amount of value, right?

214

:

Just like with anything that's highly implemented.

215

:

so you heard me say the phrase, don't run with systems.

216

:

And so I think organizations are taking a step back to really understand what is it that

they're trying to do?

217

:

What is the problem you're trying to solve?

218

:

And so automation, obviously on the surface, right?

219

:

You can lean out on your labor force.

220

:

You can lean out process.

221

:

You can streamline stuff.

222

:

Hey, like I'm not firing you or not reducing the workforce.

223

:

I just need you to focus on more core business stuff, right?

224

:

Stuff that generates revenue for the organization versus doing these 10 things manually,

right?

225

:

Like, you know what I mean?

226

:

And it's not making you money.

227

:

So I think

228

:

There's a small field of people who are really diving into this right and understanding

the business value right.

229

:

It's connecting those thoughts and so.

230

:

It's one thing to understand the technology and how it works in honestly the sweat equity

behind it, right?

231

:

Like it's not just double click and install something.

232

:

There you go.

233

:

got AI in your organization.

234

:

That's not how it works.

235

:

So you, you have to have the engineers and the really smart people behind the scenes to

implement it right in a way that, you know, it's beneficial.

236

:

And then you have to take that technology and then present it to your internal customers,

your stakeholders and your business leaders and say,

237

:

Hey, I did this really high speed cool thing we should pay for it.

238

:

And they're like, in that transition, I guess you will, or translation needs to happen.

239

:

And that's very difficult.

240

:

So I think, especially in the gaming world, you know, they do a lot of data to affect

daily, monthly, quarterly business decisions, right?

241

:

And so obviously these organizations want a system or a tool

242

:

to help them make better business decisions, right?

243

:

So it's making a big splash all over the news.

244

:

I get it.

245

:

Like I just think the normal population doesn't understand the efforts it takes to

implement systems and then put guardrails around it.

246

:

Like that's the other thing, put guardrails.

247

:

You don't want your, you know, dirty laundry all over the internet, right?

248

:

Like, so it's trying to put those guardrails in place.

249

:

So I think organizations put efforts.

250

:

implementing it is I just don't think they should be running what's in the works by

itself.

251

:

Got it.

252

:

As you said, it's the new topic.

253

:

Everyone's talking about it.

254

:

Everybody wants to hear about it.

255

:

But how could a business protect themselves with this new, and it's not even new, let's be

honest, like AI has been around for quite a while, but I guess it's a new hot topic now.

256

:

Like how are these businesses able to protect themselves?

257

:

Well, the irony in it is to, cause they're security, cybersecurity AI tools, right?

258

:

You know, I think, Hey, getting the talent in-house, right?

259

:

You gotta have the talent.

260

:

I'm not saying, you know, go out and hire a team of engineers, just to do AI, right?

261

:

Like I'm sure these organizations have talented in-house people.

262

:

to step into these roles.

263

:

And I think partnering with a good partner, right?

264

:

And that helps.

265

:

I think protecting themselves and the organization from, as you call it, AI, there's ways

to put restrictions in place, right?

266

:

Like in controls in place to ensure that your data is not

267

:

all of the internet.

268

:

The problem is, it's the commercial side, right?

269

:

The consumer side of AI is preventing, know, Tina and accounting from importing her this,

you know, salary report in Excel into ChapDVT, right?

270

:

Like that's the challenge, right?

271

:

Or, hey, I have this raw data output from my gaming system at this property, now I'm going

to do analysis on it, right?

272

:

So I'm going to import it into the, know, Craig Turner AI app.

273

:

Right.

274

:

And so that's the danger here.

275

:

Right.

276

:

Because once you get, it's on the internet.

277

:

You can't get it back.

278

:

Like, you know, once you give it airtime, there's no walking it back.

279

:

And so that's it's protecting that type of data, you know, out on the internet.

280

:

And so you don't want to curb their moxie, right?

281

:

Like these are team members who are trying to do a great job and, know,

282

:

hit home runs and stuff.

283

:

But on the other hand, it's kind of like, well, you know, I don't want to curb your moxie,

but we need to stay in these guardrails right now and protect the organization.

284

:

Because at the end of the day, it's not their data, right?

285

:

It's the organization's data.

286

:

you know, you're at the end of the day, cybersecurity teams, know, IT are to put

inconveniences, if you will.

287

:

And you can't use this extension.

288

:

Your browser is going be locked down.

289

:

not going to be able go to these websites.

290

:

Right?

291

:

You you can't, you know, this type of data, right?

292

:

And so, right.

293

:

And these are all good controls.

294

:

It's just understanding that team members need to understand it's like, it's not your

data.

295

:

You don't have inadvertent exposure of PI information, HR data and stuff like that, just

because you want to, you know, have a fancy pie chart, right?

296

:

Like, and so that's the type of stuff.

297

:

I think what's really interesting, most organizations,

298

:

are looking at and what we've got official is that the cybersecurity, LLMs and the machine

learning and AI tools that they had going on because that could really help those teams

299

:

because you know, they're, typically run lean.

300

:

They typically, I'm not saying that they're running on a treadmill, right?

301

:

Like trying to plug all the holes and so having a strong AI system, if you will, right.

302

:

to augment those gaps, right?

303

:

Those challenges for them.

304

:

And a perfect example would be, marketing, marketing was exposed, his credentials got

honed or what have you, and you have this AI system in place to identify Mark's been

305

:

compromised.

306

:

So we're going to make his identity extremely high risk, and we're going to challenge him

with.

307

:

MFA or everything like that.

308

:

And if that's not good enough, then we're going to alert the cybersecurity team and IT and

say, Hey, Mark's been exposed, have them come in or have a reset of password.

309

:

And that all can be done automatically, like without human intervention.

310

:

But to get to that point is a lot of sweat equity to, you know, condition it right.

311

:

And to train the system.

312

:

So we're just not there yet.

313

:

It's not as far as everyone believes it is, so I get it.

314

:

And then just kind of looking at your LinkedIn profile, I'd seen that you have experience

with Microsoft 360.

315

:

Can you just share us about with your experience?

316

:

Yeah, so M365 is kind of like the enterprise collaborative programs or applications that I

would say 90 % of the world uses, right?

317

:

know, school districts, government, municipalities, DOD, know, gaming.

318

:

It's Microsoft Word, it's email, it's Outlook, it's Teams, you know, all these

collaborative office suite.

319

:

Right?

320

:

So it's...

321

:

In infancy, it was really just about email being forklifted into the cloud, right?

322

:

And every exchange administrator in the world was clapping and celebrating laughs.

323

:

don't have to maintain exchange servers anymore, right?

324

:

Like, but it's over the years and it's expanding quite a bit.

325

:

And so there's so many, I don't know, branches off of it now that, you know, it's very

hard to find someone who knows.

326

:

Everything about M365, much as we try to learn a Microsoft's constantly moving the

goalposts on, know, like, you know, this one thing you have it down, they make a change

327

:

and it humbles you really quickly.

328

:

So yeah, I think.

329

:

Everybody's familiar with Microsoft Office Suite, you know, and they're always constantly

doing a rebranding of.

330

:

What they're going to call it now, so I think they're rewinding it again, co-pilot office

or office co-pilot.

331

:

That's kind of what my experience is.

332

:

it and then so what are some of the you systems that you currently use for pen

entertainment?

333

:

I mean, short answer, all of the above.

334

:

I think the major ones from an infrastructure standpoint, you know, were a big Cisco

organization, VMware, peer storage, Rubix.

335

:

You know, that's a solution that will help organizations protect themselves as well as

recover, right?

336

:

You know, not everybody's perfect.

337

:

And so if you do get polymer,

338

:

You know, copper moment, you have a solution in place to restore business, cognitively

disasters and stuff like that.

339

:

So, you know, when I was growing up, natural disasters, actors, God, where your disaster

right now, it's ransomware and the services and disaster.

340

:

Right.

341

:

So being able to recover from those things, having a system of like river since when the

system got to used.

342

:

And then, you know, windows, Linux, you know, we do a lot of cloud.

343

:

So we have.

344

:

GCP, AWS, Azure, like I said, it's all of the above, right?

345

:

Like, you know, and I'm sure there's a hundred more tools that, you know, that teams use

that we're just not, you know, I don't use on-board resources.

346

:

I know Pablo's and Power BI is another suite of tools that our organization uses.

347

:

Yeah, it's a lot.

348

:

Got it.

349

:

Too many, I guess to learn all of them, but no, that's awesome.

350

:

Then just go back to security.

351

:

There's always changes.

352

:

How do you keep up with all the changes when it comes to cybersecurity?

353

:

There is a lot of changes, but I think as you become more seasoned in discipline, in your

trade, you realize these changes are noise, right?

354

:

then what I mean by that is it's not chasing the shiny fishing oil, right?

355

:

I think there's still value in sweat equity, being rolling up your sleeves and really

diving into hearty your systems, right?

356

:

And then I think there's still value in some of the techniques and disciplines that, you

know, these larger certifications, like, you know, a lot of these, you know, CIS plus

357

:

certifications, know, level of fact has a certification now.

358

:

I think

359

:

Having that foundation will get you 50, 60 % there, right?

360

:

And then developing your own skills to get you to the next level.

361

:

I think the changes are cosmetic.

362

:

A lot of times I think it's, you know, big marketing, right?

363

:

And then understanding, you know, stop looking through a straw and look through a car

windshield, like, all right, now I can see the forest through the trees kind of thing,

364

:

right?

365

:

It's understanding like, right, let me, cause there's only one way to eat it all at one

bite at a time.

366

:

So like if you're constantly, you know, chasing these changes, right.

367

:

You're not going to get anything done.

368

:

Like, so we all think we were good at multitasking or not.

369

:

Like, so it's, you know, I like to say human beings are windows where, you know, windows

is really good at start and stopping really fast.

370

:

Whereas Linux and Unix are true multitasking, multiprocessing.

371

:

So I.

372

:

I that's the best approach, and understanding what those changes could really impact.

373

:

It's one of those things, right?

374

:

It's just like a new kid on the block or this new tool or this big shift in change and

what is the biggest threat.

375

:

Ransomware is today is the biggest threat, but it might be.

376

:

fishing tomorrow, right?

377

:

And so like you're constantly like, all right, well, I'm going to focus on this now,

right?

378

:

And then I got to focus like, then you completely forget about these other threads, right?

379

:

Like, hey, so I don't know, it's exhausting to say the least.

380

:

And I feel like this with anything we do, there's always going to be something new.

381

:

And I'm just curious, Craig, have you read the book, The One Thing?

382

:

The one thing?

383

:

Yes.

384

:

No, I haven't.

385

:

Okay, I'm not sure if you're a big reader, but it's kind of what the book talks about,

just like, you know, how we're not great multitaskers.

386

:

So if you're reader, I recommend it.

387

:

When I grew up, there was a book called Getting Things Done.

388

:

it's very similar in that mindset.

389

:

And one of the things that the author preached about is, and check your email three times

a day.

390

:

Put an auto office on and say, look, I want to check my email three times a day.

391

:

If it's that important, you need to call me, me, or come get me if you work in the office.

392

:

But if you send me an email, just

393

:

just know that I probably won't read it until the end of the day and I'm not gonna respond

until the next day.

394

:

Like so, yeah, it's.

395

:

That's pretty much what the book talks about, so I'm sure it's very similar.

396

:

So thank you for sharing that, Craig.

397

:

And then when it comes to your role, the compliance, what does that play in infrastructure

management at Penn Entertainment, and how do you ensure to industry standards?

398

:

compliance is, I would say, it's a necessary needle.

399

:

Right.

400

:

And so it can be very frustrating at times because you find yourself repeating yourself

day in and day out for gaming specifically.

401

:

It's extremely important.

402

:

Right.

403

:

And reason being is, it's like, you have internal compliance, right?

404

:

They're trying to protect the organization, make sure these teams are doing what they're

saying they're doing.

405

:

Right.

406

:

And

407

:

It's kind of that whole trust but verify type of thing, right?

408

:

And then you have these governing bodies, know, gaming control boards, each jurisdiction,

each state has their own set of rules, right?

409

:

Like how they want things done.

410

:

So compliance, and this goes across the board of many organizations, industries, right?

411

:

You got banking, you got financials, you got with fends, you got all these school

districts, right?

412

:

They all have.

413

:

governing bodies with governing controls, right?

414

:

And so I think it's extremely important.

415

:

Sometimes the application of it, I think, is less than we desired.

416

:

And I think, you know, there is a lot of room for improvement, if you will.

417

:

So in regards to, you know, efficiencies, knowledge, understanding, because a lot of

times, compliant analysts are

418

:

compliance teams, right?

419

:

They don't have an IT background, right?

420

:

And then they jump into it like, I gotta check all these controls.

421

:

And so, you know, it's that communication piece again, right?

422

:

Is understanding, I'm not talking to a technologist, if you will, right?

423

:

Like I'm having to meet the mark on this thing, right?

424

:

And so understanding that and being able to meet the mark and check the box and say, you

know, we're compliant is...

425

:

It's kind of like cyber security.

426

:

It's your party day to day operation, right?

427

:

Like, you know, so you can avoid it or try to get away with it now, but eventually you're

to have to pay for it, right?

428

:

Like, so pay for it now or pay for it later.

429

:

So that's kind of my mentality is just do it right the first time, you don't have to worry

about it.

430

:

You know I mean?

431

:

So.

432

:

that's so, true in anything you do.

433

:

Craig, today's been a very, you know, very pleasurable to be able to speak to you.

434

:

Is there anything that you would like to add for our audience?

435

:

You know, for anybody who's listening and trying to get into the IT industry or IT in

general, I know on the surface it seems overwhelming because there's just so much

436

:

information out there, right?

437

:

There's so much to learn.

438

:

If you listen to this podcast, right, there's only one way to eat an elephant.

439

:

It's one bite at a time.

440

:

And, you know, take that first step.

441

:

Just recently I learned, you know, the Las Vegas library, I think it's

442

:

all of the state of quite honestly, that you get a library card, you get free Udemy access

and free LinkedIn training.

443

:

That means you don't have to out of pocket, right?

444

:

As long as you go to the library and take Udemy courses, right?

445

:

Study for cert exams, you know, and stuff like that.

446

:

So there's a of material out there and, you know, don't let anybody stop you if you want

to get into IT and look.

447

:

you're going to cut your teeth out of service task or, you know, an intern job.

448

:

You're like, man, this sucks or I hate doing this or whatever.

449

:

Like there's so many branches of IT now.

450

:

Right.

451

:

Like you're bound to find something that you really enjoy and really enjoy learning.

452

:

And so I guess my my communication will be is, you know, give it a shot.

453

:

What's the worst that's going to happen?

454

:

Right.

455

:

Like, you know, you don't enjoy it.

456

:

Right.

457

:

Try the next thing.

458

:

So.

459

:

it I did not know that.

460

:

I did not know if you have a library card and so for that access to that I'm guessing you

need to be at the library to get access to UNIME and all those great courses.

461

:

No, it's crazy.

462

:

You go get a library card and they, there's a link.

463

:

You, you put your library card number in there and you have access and it's not just IT

stuff.

464

:

It's, it's data science, it's project management, it's psychology, it's up courses, right?

465

:

It's as that courses that, know, if you want to the military, like there's tons of

information, right?

466

:

Like you want to be a school teacher, right?

467

:

There's tons of courses.

468

:

If you want to get into HR, right?

469

:

Like there's tons of courses with certs and cert products and everything all completely

free.

470

:

It's crazy.

471

:

Like, I like, why isn't this like more widespread?

472

:

It's insane to me.

473

:

Like, you know, it's like, it's all right there.

474

:

Like I didn't have any of this when I was going out there.

475

:

I would have just like, my head would have exploded if I had this information, right?

476

:

Like, so yeah, you can go out, can go home, you can do it from your phone, like, you know,

wherever, but yeah.

477

:

That's amazing.

478

:

Yeah, that's great to know.

479

:

So if anyone needs that information, that is great to know.

480

:

Well, Craig, it was a pleasure.

481

:

And if someone's looking to reach out to you, how would they do so?

482

:

LinkedIn, that's the best way to do it.

483

:

The way I don't have to like, you know, my personal phone number and personal email and

like get spanned by vendors and stuff like that.

484

:

Like reach out, LinkedIn, I'll be it daily.

485

:

and that's how we connected, so that's awesome.

486

:

Well, Craig, it was a pleasure and I'm excited.

487

:

Yeah, so thank you.

488

:

I appreciate it.

Links

Chapters

Video

More from YouTube