July 14, 2021
Have you ever wondered how a hacker can spend less than $10 and break into a company that spends millions on IT security and defense? Hackers infiltrate a company’s network through its most valued – and also its weakest – security link: people. Your employees’ personal relationship with technology presents a risk to the business that requires a hard look at what hackers are doing, how you can be prepared for the next attack, and what your organization can do to triage and remediate after an attack.
With 73 percent of Americans having already experienced cybercrime personally, businesses must be concerned with how that breach extends to their employees’ workplace. In this event, we’ll examine what’s occurring and also look at ways to address the problem while enabling employees to protect themselves personally in today’s digital world (and we aren’t talking about phishing emails).
Topics covered:
Is an avalanche of telemetry data slowing down your AI initiatives? In this episode from Trace3's PressBox episode, experts from Cribl and Trace3 discuss how to gain data agility, reduce costs, and prepare for agentic AI environments. Trace3's Josh Lindstrom and Kevin Donahoe sit down with Michael Contreras from Cribl to cover everything trending in data and observability for 2026.
[00:48] Preparing Telemetry Data for AI
[02:14] Observability of the Data vs. Using the Data
[04:47] Case Study: De-risking a Global SIM Migration
[06:31] Supporting Agentic AI Environments
[08:27] The Trend of Data Ownership and Agility
[10:38] Reducing Overlapping Tool Costs & Waste
[12:48] Sneak Peek: Cribl Search 2.0 and Natural Language Queries

Is your organization ready for AI, or is hidden 'shadow data' creating massive security risks? In this Trace PressBox discussion, Trace3 Advisory CISOs Gina Yacone and Jim Hunter dive deep with Sentra's Co-Founder Yoav Regev into why data security is the heart of the AI challenge. Check out these key moments:
[00:48] Why AI is a Data Security Problem
[02:14] The 3 Pillars: Discovery, Classification, and Context
[05:17] Complementing Microsoft 365 and Copilot
[08:06] AI as a "Risk Magnifier"
[11:13] Scaling Data Security for the Enterprise
[13:17] Requesting a Proof of Value (POV)
[15:21] Identifying Shadow Data and Reducing Cloud Costs

How do you maintain application performance across a fragmented multi-cloud footprint? In this Trace3 PressBox episode, we sit down with F5 to discuss application security, delivery, and the shift toward automated infrastructure.
0:00 - Introduction to the PressBox
1:30 - The Current State of Application Security
3:45 - Why F5 is Moving Beyond Load Balancing
6:20 - Solving Multi-Cloud Complexity
9:10 - Future Outlook: AI and App Delivery
11:00 - Closing Thoughts & Resources