
The world of technology is complex. Each episode of TechSperience will uncover helpful technology, cybersecurity, cloud, and workplace transformation tips to help the everyday IT professional. Tune in for advice from leading IT experts covering retail, manufacturing, healthcare, K-12, higher education, and more.
The world of technology is complex. Each episode of TechSperience will uncover helpful technology, cybersecurity, cloud, and workplace transformation tips to help the everyday IT professional. Tune in for advice from leading IT experts covering retail, manufacturing, healthcare, K-12, higher education, and more.
Episodes

Wednesday Apr 29, 2026
Episode 146: RSAC 2026 Unplugged – What You Need To Do Now
Wednesday Apr 29, 2026
Wednesday Apr 29, 2026
In this episode, host Kim Coombes is joined by security experts John Chirillo and Rob Di Girolamo, along with Microsoft Security expert Robin Camirand, to unpack the most important insights from the RSAC 2026 Conference.
The discussion covers the rapid rise of Agentic AI security, the need to defend at machine speed, and the industry’s shift toward active defense as traditional response models struggle to keep up. The team also explores the growing importance of post-quantum cryptography as organizations prepare for the next phase of cryptographic risk.
Throughout the conversation, the panel reflects on RSAC’s defining theme, the “power of community,” and why collective defense is essential as threats become faster, more automated, and more complex. Whether you’re tracking AI-driven risks, planning for quantum readiness, or looking for clear takeaways from RSAC 2026, this episode delivers practical insights from experienced security leaders.
Moderator: Kimberlee Coombes, Security Solution Architect, Connection
Guest: John Chirillo, Principal Security Architect, Connection
Guest: Rob Di Girolamo, Senior Security Architect, Connection
Guest: Robin Camirand, Inside Solution Architect and Microsoft Security SME, Connection
Show Notes

Tuesday Mar 24, 2026
Tuesday Mar 24, 2026
In today’s rapidly shifting geopolitical landscape, cyber threats have become a frontline tactic—not through sophisticated zero-day exploits, but through the exploitation of basic security gaps like weak credentials, unpatched systems, and misconfigured environments. In this episode of the Connection Cybersecurity Podcast, host Kim Coombes is joined by security experts John Chirillo and Rob Di Girolamo to unpack the reality of modern cyber conflict.
Together, they explore how nation-state actors, ransomware groups, and hacktivists are converging, why critical infrastructure and mid-sized organizations alike are increasingly at risk, and how “proxy targeting” makes every company part of a larger attack surface. The conversation challenges common assumptions about cybersecurity, emphasizing that today’s greatest risk isn’t lack of advanced tools—but failure to address fundamental security hygiene and identity protection. Listeners will walk away with a clearer understanding of how cyber warfare is evolving, how it impacts organizations indirectly, and what practical steps leaders must take now to reduce exposure and strengthen resilience.

Monday Jan 19, 2026
Episode 144: Future Threats – Not Yet Headlines
Monday Jan 19, 2026
Monday Jan 19, 2026
In this episode, the Connection Security Center of Excellence team looks beyond today’s headlines to uncover the threats most people won’t hear about until it’s too late. The team dives into the emerging risks shaping the next era of cybersecurity—from the looming reality of harvestnowdecryptlater attacks, to the potential for identity collapse in a passwordless world, to the rise of autonomous AI agents as adversaries.
Rather than reacting to the news cycle, we explore what security leaders should be thinking about before the story breaks. If you want to understand the risks that are quietly forming on the horizon—and how they could redefine trust, identity, and digital resilience—this conversation is your early warning system.
Speakers: John Chirillo, Principal Security Architect, Connection
Rob Di Girolamo, Senior Security Architect, Connection
Kimberlee Coombes, Security Solution Architect, Connection
Show Notes:

Tuesday Jan 06, 2026
Tuesday Jan 06, 2026
Healthcare organizations are navigating modernization under intense regulatory, security, and resource constraints. This episode explores how the Microsoft technology stack shows up differently in healthcare.
The conversation breaks down hybrid cloud realities, Azure managed services, security and compliance, business resiliency, disaster recovery, and cost optimization, all grounded in real healthcare use cases. The episode also explores at how organizations can measure ROI beyond cost savings, connecting Microsoft investments to patient care, clinician experience, and operational resilience.
Speakers: Jennifer Johnson, Director of Healthcare at Connection
David Carey and Kevin Paiva, Senior Field Solution Architects at Connection
Show Notes:
00:10 Welcome and session overview
01:40 Why healthcare cloud adoption is different
02:10 Defining hybrid cloud in healthcare
03:00 Why hybrid is now the default model
03:55 Latency myths and performance realities
04:45 Which workloads belong on-prem vs. in the cloud
05:45 SaaS, staffing pressure, and infrastructure complexity
06:30 Azure managed services and Connection’s approach
07:45 Co-managed Azure vs. fully outsourced models
08:30 Why Azure over other hyperscalers
09:20 Azure security, HIPAA, and Zero Trust
10:30 Azure Health Data Services
11:45 Business continuity vs. business resiliency
14:10 What healthcare leaders worry about most today
15:00 Disaster recovery and Azure Expert MSP
16:30 Post-pandemic resource constraints
17:30 Application sprawl, security, and identity management
18:50 Cost containment and ROI in healthcare IT
21:15 The teams behind Connection’s Microsoft practice
24:45 Final takeaways and next steps

Friday Oct 31, 2025
Episode 142: Revolutionizing Healthcare with Clinical Mobility
Friday Oct 31, 2025
Friday Oct 31, 2025
This conversation explores the transformative impact of clinical mobility and technology in healthcare, focusing on how Zebra Technologies enhances clinical workflows, improves patient and provider safety, and addresses security concerns. The discussion highlights innovations in nursing, the integration of AI, and the importance of measuring ROI in healthcare technology.
The speakers share insights on Zebra's role across the healthcare ecosystem and future innovations, emphasizing the need for effective tools to support clinicians and improve patient outcomes.
Show Notes

Thursday Oct 30, 2025
Thursday Oct 30, 2025
In this conversation, the speakers discuss the intersection of data strategy and AI strategy, emphasizing the importance of collaboration between different roles within the organization. They outline their 12-month plans for AI implementation, focusing on governance, risk management, and the challenges of data governance.
The discussion also touches on the ownership of AI production systems and the principles that guide decision-making in the face of conflict. The speakers highlight the need for a balance between innovation and risk management, as well as the importance of maintaining strong partnerships within the organization.
Show Notes:
00:00 Introduction to Data and AI Strategy
08:52 12-Month Plan for AI Implementation
17:45 Balancing Innovation and Risk Management
24:50 Data Governance and Security Challenges
27:21 Managing Shadow AI and Encouraging Innovation
28:46 Vision and Innovation: The Importance of Rechecking Paths
30:34 Navigating Customer Relationships and Risk Management
31:40 Understanding NPU Technology and Its Implications
34:09 Balancing AI Workloads: Cloud vs. Local Processing
35:31 Contractual Considerations in AI Partnerships
38:48 Ownership of AI Production Systems: A Collaborative Approach
43:29 Establishing Governance and Support Structures for AI
46:04 Defining Tiebreaker Principles in AI Decision-Making
50:07 Operationalizing Governance and Risk Management
51:55 Commitments to Innovation and Collaboration

Wednesday Sep 24, 2025
Episode 140: Signals of Post-Quantum Insecurity
Wednesday Sep 24, 2025
Wednesday Sep 24, 2025
In this episode, the Connection Security Center of Excellence team takes us on a journey—both literal and technical—sharing insights gained from a recent reconnaissance road trip across the United States. Their firsthand experiences offer a front-line perspective on the evolving landscape of post-quantum insecurity. Listeners will hear from our security experts as they unpack the evolving risk landscape that we may be challenged with in a post-quantum world—supported by real world field observations. Join us for a timely and thought-provoking discussion that blends technical insight with real-world reconnaissance that will help us all navigate the post-quantum future.
For more information on how to better secure your environment, visit Connection.com/Cybersecurity. Or, if you’re ready to start the conversation around what Connection can do to help your organization—Call 1.800.998.0067.
Speakers:
John Chirillo, Principal Security Architect, Connection
Rob Di Girolamo, Senior Security Architect, Connection
Kimberlee Coombes, Security Solution Architect, Connection
Show Notes
00:00 Introduction to the Quantum Road Trip
02:50 Objectives and Planning of the Research Trip
05:34 Understanding Post-Quantum Security
08:09 Current Preparedness for Quantum Threats
10:45 Real-World Observations and Insights
13:28 Future Predictions and Data Analysis

Tuesday Jul 08, 2025
Episode 139: RSAC 2025 Unpacked - Expert Reactions from the CNXN Security Team
Tuesday Jul 08, 2025
Tuesday Jul 08, 2025
In this episode of the Connection Cybersecurity Podcast, host Kim Coombes is joined by our Security Center of Excellence leaders John Chirillo and Rob Di Girolamo, along with Microsoft Security expert Robin Camirand, to unpack the biggest insights from the RSAC 2025 Conference.
From the rise of AI-powered defenses and identity threats to the growing buzz around quantum computing, the team shares key takeaways, favorite moments, and what these trends mean for the future of cybersecurity. Whether you're curious about agentic AI, post-quantum cryptography, or just want to hear about goats and code-breaking shenanigans—this recap of the conference includes insights from our experts and has something for everyone.
For more information on how to better secure your environment, visit Connection.com/Cybersecurity
If you’re ready to start the conversation around what Connection can do to help your organization—Call 1.800.998.0067. Or, if you have a Connection account team already in place, please reach out.
Speakers
John Chirillo, Principal Security Architect, Connection
Rob Di Girolamo, Senior Security Architect, Connection
Kimberlee Coombes, Security Solution Architect, Connection
Robin Camirand, Inside Solution Architect, Connection
Show Notes
00:00 Welcome and Overview of RSAC 2025
02:27 Community and Collaboration at RSAC
04:39 Identity Management Challenges
07:58 Zero Trust Principles in Security
08:37 Quantum Computing and Post-Quantum Cryptography
10:20 Agentic AI in Security Operations
12:42 Emerging Defenses Against AI-Powered Attacks
14:48 Best Practices for Leveraging AI in Security
17:04 Favorite Moments from RSAC 2025
20:25 Summing Up RSAC 2025

Tuesday Jun 03, 2025
Tuesday Jun 03, 2025
Join Jamal Khan and Jennifer Johnson as they explore the evolving landscape of AI in healthcare, focusing on its applications, ethical considerations, data privacy, and the role of Chief AI Officers. This discussion highlights the importance of governance, patient consent, and the potential of AI to improve healthcare workflows while addressing data security challenges. Learn about how to implement AI responsibly for better healthcare outcomes and operational excellence.
Speakers:
Jamal Khan, Chief Growth and Innovation Officer at Connection
Jennifer Johnson, Director of Healthcare Strategy and Business Development at Connection
Show Notes:
For more information on AI services for healthcare, visit https://www.cnxnhelix.com/healthcare.

Monday May 05, 2025
Episode 137: Quantum Computing Threats and Countermeasures
Monday May 05, 2025
Monday May 05, 2025
Quantum computing represents a significant shift in computational power, offering both opportunities and challenges for securing sensitive data. Join the Connection Security Center of Excellence team as we delve into the transformative threats that quantum computing poses for cybersecurity and the countermeasures we should be considering to address those threats.
We'll explore the fundamentals of quantum computing, including concepts like qubits, superposition, and entanglement, and how these principles can enhance encryption and threat detection. Quantum cryptography, quantum random number generation, and quantum machine learning are some of the promising applications that could revolutionize device security.
However, quantum computing also poses risks to traditional cryptographic methods, potentially compromising data integrity, authentication protocols, and long-term data security. We'll discuss the need for quantum-resistant cryptographic algorithms and the importance of transitioning to quantum-safe technologies to protect against future quantum-enabled threats.
Join us as we navigate the exciting yet complex landscape of quantum computing and security, highlighting the advancements, challenges, and future directions that will shape the approach to cybersecurity in the quantum era.
Speakers
John Chirillo, Principal Security Architect, Connection
Rob Di Girolamo, Senior Security Architect, Connection
Kimberlee Coombes, Security Solution Architect, Connection
Lindsay Nelmes, Microsoft Solution Sales Executive, Connection
Show Notes
00:00 Introduction to Quantum Computing and Cybersecurity
02:31 Real-World Impacts of Quantum Computing
04:49 The Timeline for Quantum Threats
06:29 Industries at Risk and Proactive Measures
08:36 Understanding Quantum Resistant Algorithms
09:59 Leveraging Quantum for Cybersecurity Improvements
12:08 AI and Quantum Computing Synergy
14:07 Microsoft's Role in Quantum Security
15:30 Future Milestones in Quantum Computing
18:02 Misconceptions About Quantum Computing
20:12 Final Thoughts and Takeaways
For more information on how to better secure your environment, visit Connection.com/Cybersecurity.
