Ready, Set, Midmarket!

Ready, Set, Midmarket!
Podcast Description
Featuring midmarket IT leaders, industry experts, MSPs and vendors focused on midsized companies, this podcast focuses on the latest news, insight, tips, and trends for midmarket IT leaders.
Co-hosted by Adam Dennison, VP of Midsized Enterprise Services (MES) at The Channel Company, and Samara Lynn, senior editor of MES Computing, this episode’s guests are Jason Frame, chief information officer of the Southern Nevada Health District, and Grant Walsh, head of IT security infrastructure and operations at Flow Control Group. This episode focuses on the midmarket’s tech road ahead in 2025 including how midmarket IT leaders are using AI, their concerns about DeepSeek, cybersecurity strategies, AI customer service chat bots so realistically they are indistinguishable from human agents, and more.
Podcast Insights
Content Themes
The podcast covers specific themes such as technology predictions for 2025, the impact of AI on midmarket companies, cybersecurity strategies, and the role of customer service chat bots. Recent episodes have explored topics like the use of AI in midmarket IT departments, concerns about cybersecurity threats like DeepSeek, and innovative strategies for leveraging technology to improve operational efficiency.

Featuring midmarket IT leaders, industry experts, MSPs and vendors focused on midsized companies, this podcast focuses on the latest news, insight, tips, and trends for midmarket IT leaders.
Co-hosted by Adam Dennison, VP of Midsized Enterprise Services (MES) at The Channel Company, and Samara Lynn, senior editor of MES Computing.
“Harvest now, decrypt later.” This directive will be motivation for an expected surge in an emerging threat: quantum computing cyberattacks.
That is according to two experts on the matter who joined co-hosts Adam Dennison and Samara Lynn on the latest Ready.Set.Midmarket! podcast.
Lance Smith, co-founder and CEO of Cy4Data Labs, and John E. Young, COO of Quantum eMotion America, lent their extensive expertise on the subject of Q-Day and post-quantum computing (PQC) encryption.
Both describe how threat actors are currently harvesting encrypted data through cyberattacks. While the bad guys don’t have the means yet to decrypt this data, in the very near future they will have a way—through quantum computing.
The time frame for when threat actors will have relatively easy and widespread access to quantum computing power is what is known as “Q-Day.”
Smith and Young discuss what Q-Day is, when it’s expected to arrive, the catastrophes that can happen when hackers are able to break traditional encryption, and what midmarket leaders should do now to prepare.

Disclaimer
This podcast’s information is provided for general reference and was obtained from publicly accessible sources. The Podcast Collaborative neither produces nor verifies the content, accuracy, or suitability of this podcast. Views and opinions belong solely to the podcast creators and guests.
For a complete disclaimer, please see our Full Disclaimer on the archive page. The Podcast Collaborative bears no responsibility for the podcast’s themes, language, or overall content. Listener discretion is advised. Read our Terms of Use and Privacy Policy for more details.