PodcastsRank #47361
Artwork for ETMA Tech Talk Podcast

ETMA Tech Talk Podcast

TechnologyPodcastsBusinessManagementEN-USunited-statesDaily or near-daily
Rating unavailable
ETMA Tech Talk: Transform Technology Challenges into Strategic BreakthroughsWelcome to ETMA Tech Talk, providing insider perspectives on technologies and strategies reshaping modern organizations. This dynamic series, hosted by seasoned industry veterans, features exclusive conversations with visionary leaders: Presidents, Founders, CIOs, IT strategists, and pioneering trailblazers who transform complex technological challenges into competitive advantages. Uncover real-world frameworks, inspiring stories of bold leadership, and transformative forces shaping the future of technology management.Featured Topics Include: Strategic technology leadership, AI as transformation catalyst, scaling disruptive innovations, cybersecurity, communications networks, sustainable IT revolution, digital transformation success stories, and emerging technology impact.Personal Leadership Insights: Career journeys of leaders, decision-making frameworks for uncertainty, overcoming challenges and setbacks, building high-performance teams, and mental fitness for high-pressure environments.Who You'll Hear FromEnterprise Technology Executives from ETMA member companiesSystems Integrators and MSPs enabling aut
Top 94.7% by pitch volume (Rank #47361 of 50,000)Data updated Feb 10, 2026

Key Facts

Publishes
Daily or near-daily
Episodes
20
Founded
N/A
Category
Technology
Number of listeners
Private
Hidden on public pages

Listen to this Podcast

Pitch this podcast
Get the guest pitch kit.
Book a quick demo to unlock the outreach details you actually need before you hit send.
  • Verified contact + outreach fields
  • Exact listener estimates (not just bands)
  • Reply rate + response timing signals
10 minutes. Friendly walkthrough. No pressure.
Book a demo
Public snapshot
Audience: N/A
Canonical: https://podpitch.com/podcasts/etma-tech-talk-podcast
Cadence: Active weekly
Reply rate: 35%+

Latest Episodes

Back to top

Navigate Mobile Security Threats with Paul Troisi CEO of Troy Mobility ETMA Tech Talk

Tue Feb 03 2026

Listen

Navigate Mobile Security Threats with Paul Troisi CEO of Troy Mobility ETMA Tech Talk Podcast Enterprise mobility security rarely collapses in a single moment. It weakens over time. One device slips outside policy. Smartphones receive less security and controls than corporate laptops. On this ETMA Tech Talk Podcast, Paul Troisi joins host Joe Basili to discuss how mobile devices became the most underestimated risk inside most organizations, even as they sit at the center of daily work. The discussion stays practical, occasionally uncomfortable, and firmly rooted in experience earned across hundreds of deployments. The Most Used Endpoint in the Enterprise Gets the Least Attention Mobile devices touch nearly every enterprise system that matters: Email, collaboration platforms, CRM, financial applications, HR systems, cloud services and more. Many organizations continue to secure smartphones differently than laptops. Enterprises invest in endpoint detection, VPNs, identity controls, and layered defenses for traditional endpoints. Smartphones often operate with limited visibility, fragmented controls, and inconsistent enforcement. From a threat actor’s perspective, the weakest point in the environment is obvious. This is why Paul emphasizes device parity. If mobile devices access the same corporate data and cloud services as laptops, they should be governed and protected at the same level. Not similar. The same. What Mature Mobility Programs Actually Look Like The strongest mobility programs are disciplined and predictable. Across more than 1,500 mobile security implementations, Troy Mobility has seen the same traits in high-performing environments. Clear lifecycle management. Identity enforcement that holds up under pressure. AI Has Shifted the Threat Curve Threat actors use AI to personalize phishing, smishing, and executive impersonation attacks with increasing precision. Mobile devices are an attractive entry point because controls are often weaker and behavioral signals are harder to monitor. Messages look routine. Requests sound credible. Timing feels deliberate. These attacks bypass legacy controls by blending into normal behavior. Paul sees organizations struggle not because they ignore security, but because existing tools were not designed for this level of personalization. Why Cost Arguments Miss the Point Security conversations often stall around budget. Paul challenges this thinking. The cost of platforms is visible and measurable. The cost of a mobile-driven breach is not. Reputational damage, regulatory exposure, executive accountability, and operational disruption rarely appear on procurement spreadsheets until the damage is done. Price still matters. Fit matters more. BYOD Is No Longer the Real Debate Modern mobile platforms enforce strict privacy boundaries regardless of ownership. MDM tools cannot read personal photos, messages, or call logs. That misconception persists and continues to slow adoption. A Founder’s Perspective Shaped by Timing Paul’s entry into mobility security started during the 2008 recession. No funding. No customers. Four young children at home. Paul credits his success to constant learning. Why This Conversation Matters Now Enterprise mobility sits at the intersection of security, finance, operations, and productivity. For leaders responsible for technology management, cybersecurity, FinOps, procurement, and enterprise risk, the conversation is worth the time. 🎥 YouTube https://youtu.be/vK8hR9CIuoA 🎧 Podcast Spotify: https://open.spotify.com/show/39v180fktYhRSbcq3hk9rnApple Podcasts: https://podcasts.apple.com/us/podcast/etma-tech-talk-podcast/id1822837171iHeartRadio: https://www.iheart.com/podcast/269-etma-tech-talk-podcast-282837991/Connect:  Paul Troisi  linkedin.com/in/paul-troisi        Troy Mobility https://www.troymobility.com 📣 Brought to you by: https://www.etma.org

More

Navigate Mobile Security Threats with Paul Troisi CEO of Troy Mobility ETMA Tech Talk Podcast Enterprise mobility security rarely collapses in a single moment. It weakens over time. One device slips outside policy. Smartphones receive less security and controls than corporate laptops. On this ETMA Tech Talk Podcast, Paul Troisi joins host Joe Basili to discuss how mobile devices became the most underestimated risk inside most organizations, even as they sit at the center of daily work. The discussion stays practical, occasionally uncomfortable, and firmly rooted in experience earned across hundreds of deployments. The Most Used Endpoint in the Enterprise Gets the Least Attention Mobile devices touch nearly every enterprise system that matters: Email, collaboration platforms, CRM, financial applications, HR systems, cloud services and more. Many organizations continue to secure smartphones differently than laptops. Enterprises invest in endpoint detection, VPNs, identity controls, and layered defenses for traditional endpoints. Smartphones often operate with limited visibility, fragmented controls, and inconsistent enforcement. From a threat actor’s perspective, the weakest point in the environment is obvious. This is why Paul emphasizes device parity. If mobile devices access the same corporate data and cloud services as laptops, they should be governed and protected at the same level. Not similar. The same. What Mature Mobility Programs Actually Look Like The strongest mobility programs are disciplined and predictable. Across more than 1,500 mobile security implementations, Troy Mobility has seen the same traits in high-performing environments. Clear lifecycle management. Identity enforcement that holds up under pressure. AI Has Shifted the Threat Curve Threat actors use AI to personalize phishing, smishing, and executive impersonation attacks with increasing precision. Mobile devices are an attractive entry point because controls are often weaker and behavioral signals are harder to monitor. Messages look routine. Requests sound credible. Timing feels deliberate. These attacks bypass legacy controls by blending into normal behavior. Paul sees organizations struggle not because they ignore security, but because existing tools were not designed for this level of personalization. Why Cost Arguments Miss the Point Security conversations often stall around budget. Paul challenges this thinking. The cost of platforms is visible and measurable. The cost of a mobile-driven breach is not. Reputational damage, regulatory exposure, executive accountability, and operational disruption rarely appear on procurement spreadsheets until the damage is done. Price still matters. Fit matters more. BYOD Is No Longer the Real Debate Modern mobile platforms enforce strict privacy boundaries regardless of ownership. MDM tools cannot read personal photos, messages, or call logs. That misconception persists and continues to slow adoption. A Founder’s Perspective Shaped by Timing Paul’s entry into mobility security started during the 2008 recession. No funding. No customers. Four young children at home. Paul credits his success to constant learning. Why This Conversation Matters Now Enterprise mobility sits at the intersection of security, finance, operations, and productivity. For leaders responsible for technology management, cybersecurity, FinOps, procurement, and enterprise risk, the conversation is worth the time. 🎥 YouTube https://youtu.be/vK8hR9CIuoA 🎧 Podcast Spotify: https://open.spotify.com/show/39v180fktYhRSbcq3hk9rnApple Podcasts: https://podcasts.apple.com/us/podcast/etma-tech-talk-podcast/id1822837171iHeartRadio: https://www.iheart.com/podcast/269-etma-tech-talk-podcast-282837991/Connect:  Paul Troisi  linkedin.com/in/paul-troisi        Troy Mobility https://www.troymobility.com 📣 Brought to you by: https://www.etma.org

Key Metrics

Back to top
Pitches sent
6
From PodPitch users
Rank
#47361
Top 94.7% by pitch volume (Rank #47361 of 50,000)
Average rating
N/A
Ratings count may be unavailable
Reviews
N/A
Written reviews (when available)
Publish cadence
Daily or near-daily
Active weekly
Episode count
20
Data updated
Feb 10, 2026
Social followers
N/A

Public Snapshot

Back to top
Country
United States
Language
EN-US
Language (ISO)
Release cadence
Daily or near-daily
Latest episode date
Tue Feb 03 2026

Audience & Outreach (Public)

Back to top
Audience range
Private
Hidden on public pages
Reply rate band
35%+
Public band
Response time band
1–2 days
Public band
Replies received
1–5
Public band

Public ranges are rounded for privacy. Unlock the full report for exact values.

Presence & Signals

Back to top
Social followers
N/A
Contact available
Yes
Masked on public pages
Sponsors detected
Private
Hidden on public pages
Guest format
Private
Hidden on public pages

Social links

No public profiles listed.

Demo to Unlock Full Outreach Intelligence

We publicly share enough context for discovery. For actionable outreach data, unlock the private blocks below.

Audience & Growth
Demo to unlock
Monthly listeners49,360
Reply rate18.2%
Avg response4.1 days
See audience size and growth. Demo to unlock.
Contact preview
j***@hidden
Get verified host contact details. Demo to unlock.
Sponsor signals
Demo to unlock
Sponsor mentionsLikely
Ad-read historyAvailable
View sponsorship signals and ad read history. Demo to unlock.
Book a demo

How To Pitch ETMA Tech Talk Podcast

Back to top

Want to get booked on podcasts like this?

Become the guest your future customers already trust.

PodPitch helps you find shows, draft personalized pitches, and hit send faster. We share enough public context for discovery; for actionable outreach data, unlock the private blocks.

  • Identify shows that match your audience and offer.
  • Write pitches in your voice (nothing sends without you).
  • Move from “maybe later” to booked interviews faster.
  • Unlock deeper outreach intelligence with a quick demo.

This show is Rank #47361 by pitch volume, with 6 pitches sent by PodPitch users.

Book a demoBrowse more shows10 minutes. Friendly walkthrough. No pressure.
Rating unavailable
RatingsN/A
Written reviewsN/A

We summarize public review counts here; full review text aggregation is not shown on PodPitch yet.

Frequently Asked Questions About ETMA Tech Talk Podcast

Back to top

What is ETMA Tech Talk Podcast about?

ETMA Tech Talk: Transform Technology Challenges into Strategic BreakthroughsWelcome to ETMA Tech Talk, providing insider perspectives on technologies and strategies reshaping modern organizations. This dynamic series, hosted by seasoned industry veterans, features exclusive conversations with visionary leaders: Presidents, Founders, CIOs, IT strategists, and pioneering trailblazers who transform complex technological challenges into competitive advantages. Uncover real-world frameworks, inspiring stories of bold leadership, and transformative forces shaping the future of technology management.Featured Topics Include: Strategic technology leadership, AI as transformation catalyst, scaling disruptive innovations, cybersecurity, communications networks, sustainable IT revolution, digital transformation success stories, and emerging technology impact.Personal Leadership Insights: Career journeys of leaders, decision-making frameworks for uncertainty, overcoming challenges and setbacks, building high-performance teams, and mental fitness for high-pressure environments.Who You'll Hear FromEnterprise Technology Executives from ETMA member companiesSystems Integrators and MSPs enabling aut

How often does ETMA Tech Talk Podcast publish new episodes?

Daily or near-daily

How many listeners does ETMA Tech Talk Podcast get?

PodPitch shows a public audience band (like "N/A"). Book a demo to unlock exact audience estimates and how we calculate them.

How can I pitch ETMA Tech Talk Podcast?

Use PodPitch to access verified outreach details and pitch recommendations for ETMA Tech Talk Podcast. Start at https://podpitch.com/try/1.

Which podcasts are similar to ETMA Tech Talk Podcast?

This page includes internal links to similar podcasts. You can also browse the full directory at https://podpitch.com/podcasts.

How do I contact ETMA Tech Talk Podcast?

Public pages only show a masked contact preview. Book a demo to unlock verified email and outreach fields.

Quick favor for your future self: want podcast bookings without the extra mental load? PodPitch helps you find shows, draft personalized pitches, and hit send faster.