PKWARE에서 제공하는 콘텐츠입니다. 에피소드, 그래픽, 팟캐스트 설명을 포함한 모든 팟캐스트 콘텐츠는 PKWARE 또는 해당 팟캐스트 플랫폼 파트너가 직접 업로드하고 제공합니다. 누군가가 귀하의 허락 없이 귀하의 저작물을 사용하고 있다고 생각되는 경우 여기에 설명된 절차를 따르실 수 있습니다 https://ko.player.fm/legal.
Let’s talk about adulting— actual adulting. Not just paying bills or keeping a houseplant alive, but the kind that involves emotional maturity, healthy boundaries, and conscious self-leadership. Because let’s be honest, most of us weren’t taught how to be fully functioning adults… and it shows. Joining us is Michelle Chalfant , licensed therapist turned holistic life coach, creator of The Adult Chair® model, and author of the new book The Adult Chair: Get Unstuck, Claim Your Power, and Transform Your Life . With millions reached through her podcast, coaching programs, and retreats, she’s here to walk us through the five pillars of being a healthy, grounded adult. Here’s the truth: being an adult isn’t about checking boxes or pretending you’re fine. It’s about owning your truth. Feeling your feelings. Practicing compassion without letting yourself off the hook. It’s about setting firm boundaries—with no need for justification—and recognizing that your triggers are not flaws, they’re clues. None of us were handed a guidebook for how to grow up emotionally. We inherited patterns from people who were figuring it out as they went. But what Michelle shares today is empowering: it’s never too late to unlearn what no longer serves you and become the adult you were meant to be. Whether you’re starting this work or knee-deep in your personal development era, this episode will meet you where you are—and help you move forward with clarity, self-trust, and strength. Connect with Michelle: Website: https://theadultchair.com/ Book: https://theadultchair.com/book IG: https://www.instagram.com/themichellechalfant/?hl=en FB: https://www.facebook.com/@TheMichelleChalfant/ YouTube: https://www.youtube.com/c/michellechalfant Related Podcast Episodes: How To Build Emotionally Mature Leaders with Dr. Christie Smith | 272 Boundaries vs. Ultimatums with Jan & Jillian Yuhas | 297 Gentleness: Cultivating Compassion for Yourself and Others with Courtney Carver | 282 Share the Love: If you found this episode insightful, please share it with a friend, tag us on social media, and leave a review on your favorite podcast platform! 🔗 Subscribe & Review: Apple Podcasts | Spotify | Amazon Music Learn more about your ad choices. Visit megaphone.fm/adchoices…
PKWARE에서 제공하는 콘텐츠입니다. 에피소드, 그래픽, 팟캐스트 설명을 포함한 모든 팟캐스트 콘텐츠는 PKWARE 또는 해당 팟캐스트 플랫폼 파트너가 직접 업로드하고 제공합니다. 누군가가 귀하의 허락 없이 귀하의 저작물을 사용하고 있다고 생각되는 경우 여기에 설명된 절차를 따르실 수 있습니다 https://ko.player.fm/legal.
User interface and experience design is one of the most critical aspects of successful software. Done well, UX/UI actually goes largely unnoticed, and users will intuitively perform the right actions. With complex solutions like cybersecurity, user interface and experience become even more central to ensuring the right steps are performed to discover and protect data. UX/UI experts Mike Kornacki and Mike Rhode join host Spencer Kupferman to unpack more about UX/UI design, the science behind it, and how it can contribute to an organization’s cybersecurity.
PKWARE에서 제공하는 콘텐츠입니다. 에피소드, 그래픽, 팟캐스트 설명을 포함한 모든 팟캐스트 콘텐츠는 PKWARE 또는 해당 팟캐스트 플랫폼 파트너가 직접 업로드하고 제공합니다. 누군가가 귀하의 허락 없이 귀하의 저작물을 사용하고 있다고 생각되는 경우 여기에 설명된 절차를 따르실 수 있습니다 https://ko.player.fm/legal.
User interface and experience design is one of the most critical aspects of successful software. Done well, UX/UI actually goes largely unnoticed, and users will intuitively perform the right actions. With complex solutions like cybersecurity, user interface and experience become even more central to ensuring the right steps are performed to discover and protect data. UX/UI experts Mike Kornacki and Mike Rhode join host Spencer Kupferman to unpack more about UX/UI design, the science behind it, and how it can contribute to an organization’s cybersecurity.
Join PKWARE's CEO, Spencer Kupferman, and Eden Priela of Converge Technologies as they unravel the complexities of data security, emphasizing classification and discovery. Discover how AI-driven advancements have reshaped data management over the past decade. Explore use cases showcasing how classification and discovery mitigate risks and meet compliance mandates such as PCI. Gain insights into implementing a security-first mindset across organizations, locally and globally.…
Explore the groundbreaking SchemaLink Technology by PKWARE, unraveling how it solves the unsolved challenges in z/OS data security. Join us as we delve into the intricacies of PK Protect, questioning, understanding, and demystifying the evolution of precise sensitive data discovery on z/OS datasets.
In this podcast episode, featuring the insightful Dusty Rivers as the guest, we delve deep into the world of mainframe modernization—an essential conversation for businesses navigating the digital landscape. As an eminent figure well-versed in all facets of mainframe systems, Dusty talks about demystifying the concept of mainframe modernization. He passionately articulates its significance in today's tech landscape, highlighting how this evolution is not just a choice but a necessity for businesses aiming to stay competitive and agile in the digital era especially as it relates to z/OS systems.…
Our recent podcast with Len Santalucia delves deep into the ever-changing mainframe security landscape. We discuss how z/OS is the ultimate platform for sensitive data and has been for 40 years making it a prime target for those with malicious intent. Len identifies insider threats as one of the top security concerns for IBM Z, while providing insights into the best practices for actually protecting the data.…
In our latest Productivity Protected Podcast, we had the pleasure of speaking with Meredith Stowell, Vice President of IBM Z Ecosystem. With her extensive background in technology and a deep understanding of IBM's innovative solutions, Stowell shared her insights about her journey into technology, the evolution of mainframe technology, the impact of quantum-resistant cryptography, the intersection of Telum and AI with mainframe cybersecurity, the challenges posed by rapid AI advancements, and the key takeaways about IBM Z Ecosystem.…
In this podcast, we are speaking with Nidhi Mahajan, an expert from our Engineering Team, discussing our recently released Dynamic Masking feature. We discuss the differences between Dynamic Masking and Static Masking, highlighting our real-time approach and preservation of original data along with ensuring data integrity and ensuring compliance is met. Nidhi highlights how user-friendly PKWARE's Dynamic Masking is, with its intuitive interface, easy implementation and how the solution delivers robust data protection without compromise. Tune in to gain valuable insights from Nidhi's experience and learn about the cutting-edge capabilities of PKWARE's Dynamic Masking.…
As data has evolved over the years, so too has data risk management changed and evolved. Mandates such as HIPAA, GDPR, CCPA, and PCI DSS continue to adjust how organizations collect, use, store, and protect their data, while new advancements such as AI offer new ways to achieve—or circumvent—that protection. Converge VP Solution Architecture Dan Gregory joins host Spencer Kupferman to talk about security cultures, personalized data risk assessments, and what listeners can do today to prepare for the cybersecurity needs of tomorrow.…
Sensitive data discovery seems like a straightforward process, but in reality, it’s a nuanced practice that involves detailed understanding in order to make sure that organizations are as aware and protected as possible. Businesses must have a comprehensive view of data that is easy to implement and use, and can scale as data inevitably grows. Bloor Research Senior Analyst Daniel Howard joins host Spencer Kupferman to discuss data discovery and data governance, the challenges organizations face with discovery, and the importance of having an inclusive and ongoing process to protect sensitive data.…
At PKWARE, we’ve always been about progress, and that includes building an organization that celebrates and encourages women in technology and leadership roles. In honor of International Women’s Day and Women’s History Month, join Kathy Myhand, VP of People, and Jothi Agnitha, Engineering, along with guest host Dawn Jonckowski, Director of Corporate Communications, as they discuss the women who’ve blazed the trails for them and how to encourage the upcoming generations on their tech and leadership career journeys.…
The dark web is home to the fraud economy and multiple criminal communities, rife with stolen data. It’s a complex and twisted environment that the average internet user should avoid, but what happens when they learn their data is available for sale there? Founder and CEO of Q6 Cyber Eli Dominitz joins host Spencer Kupferman to discuss his career evolution into dark web threat intelligence, how to unravel and identify threat sources, and why businesses should always have an expert monitoring the dark web on their behalf.…
Protecting your data sometimes requires thinking like a threat actor. Enter ethical hackers, authorized security experts that try to break into your systems on purpose so you know where to improve security measures. Hacker and CypherCon founder Michael Goetzman joins Spencer Kupferman to share his tech journey into ethical hacking and how the annual CypherCon hacking event has impacted the cybersecurity world for the better.…
User interface and experience design is one of the most critical aspects of successful software. Done well, UX/UI actually goes largely unnoticed, and users will intuitively perform the right actions. With complex solutions like cybersecurity, user interface and experience become even more central to ensuring the right steps are performed to discover and protect data. UX/UI experts Mike Kornacki and Mike Rhode join host Spencer Kupferman to unpack more about UX/UI design, the science behind it, and how it can contribute to an organization’s cybersecurity.…
Over the past several decades, Israel has become a powerhouse in cybersecurity, supplying a large percentage of the world’s cyber technology. Israel has also focused on assisting smaller nations in creating cybersecurity startups. Josh Cohen, Director of Cyber Security at the Economic and Trade Office at the Embassy of Israel in Washington, D.C., joins host Spencer Kupferman to discuss more about Israel’s ongoing investment in cybersecurity both for its own nation and the world.…
In many organizations, the CFO’s responsibility in overseeing company funds puts them in control of signing off on risks, including how data is handled. CFOs end up playing a specific role in helping their organization prepare for the inevitable risk of a cyber-attack. PKWARE CFO Matt Zomboracz joins host Spencer Kupferman to discuss his experience in protecting sensitive data during his career in finance, as well as what CFOs need to know about data breaches.…
The ZIP file revolutionized the way information could be shared between computers prior to the internet, and it was invented by none other than PKWARE founder Phil Katz. Our unique role as a trusted data compression provider has enabled PKWARE to evolve over the last four decades to now include encryption and other forms of data security. Senior Director of Software Development Engineering and PKWARE historian Jack Dale joins Spencer Kupferman to talk about the journey from ZIP to data protection.…
플레이어 FM에 오신것을 환영합니다!
플레이어 FM은 웹에서 고품질 팟캐스트를 검색하여 지금 바로 즐길 수 있도록 합니다. 최고의 팟캐스트 앱이며 Android, iPhone 및 웹에서도 작동합니다. 장치 간 구독 동기화를 위해 가입하세요.