About Ken Czekaj

I partner with customers to solve their business problems. Typically, that involves a collaborative design for network, cyber and/or application performance management solutions to address the unique business challenges of enterprise, energy, healthcare manufacturing and financial customers. My expertise is in the areas of Digital Transformation, Cloud, Service Triage, Application Rollouts, Digital Transformation, VoIP, Video, Capacity Planning, Cybersecurity, Latency, Multi-Tier and Virtualized applications. My focus is on solving business problems.

A Model for a Successful Tools Rollout
avatar

Problem to Solve:  A Model for a Successful Tools Rollout

Here is a link to an article I wrote for GRCoutlook.com in March 2022.  It covers some of the best practices and guidelines for a successful network or cybersecurity tools deployment.

A Model for a Successful Tools Rollout

 

INTERVIEW: Healthcare IT Today — Does IoT Increase Security Risks in Healthcare?
avatar

Problem to Solve: Does IoT Increase Security Risks in Healthcare?

I had the privilege to be interviewed by Colin Hung from HealthcareITtoday.com regarding the many challenges & risks associated with Internet of Things security in Healthcare. In a nutshell, the session highlights the benefits, threats & considerations related to IoT deployments.

Here is the link to the original article posted on the Healthcare IT Today website.

Does IoT Increase Security Risks in Healthcare?

Gallery

INTERVIEW: SiliconAngle “TheCube” on IT Security in Healthcare
avatar

Problem to Solve: Hospitals combat rising denial-of-service attacks with network triage I had the privilege to be interviewed by SilconANGLE “theCUBE” regarding the many challenges in IT security in Healthcare. In a nutshell, the session highlights the challenges and safety … Continue reading

COVID-19: A lesson in being Grateful?
avatar

Problem to Solve: The COVID-19 virus has affected much of our lives. What can I do to help? While the very serious COVID-19 outbreak has seemingly been non-stop bad news and affecting lives everywhere, it has taught me something very … Continue reading

Old MacDonald had a Farm .. E-I-E-IoT
avatar

Problem to Solve: My company has invested in an IoT platform. For such a vast network of data collection, how can we assure service delivery and performance for the whole platform? So what does an old school nursery rhyme have … Continue reading

NCAA Basketball Tournament Deflating Your Network?
avatar

Problem to Solve:  With the popularity of the video streaming of the NCAA Basketball tournament, how can I be sure that our network does not collapse under the load? Under the definition of irony, would be a picture of me .. … Continue reading

System Burp in your ERP?
avatar

Problem to Solve – We have an ERP system that is critical to our business. Service degradations and outages are extremely visible to executive management and costly to our bottom line. What is the best approach to monitor this deployment? … Continue reading

SIEM Bat Time .. SIEM Bat Channel (Hacktivism #8)
avatar

Problem to Solve: How can we integrate our Cybersecurity SIEM with data from our Application and Network Performance Management solutions? For those of us with a little “gray in our hair” will remember the end of the ORIGINAL Batman series … Continue reading

Remote Remote .. It’s Work From Home We Go (Hacktivism #6)
avatar

Problem to Solve:  What can we do to protect VPN connections, remote employees working @ home, and B2B links from Cybersecurity / Hacktivism? Can you picture our happy dwarfs that work from home singing to themselves all day long “Remote .. Remote … It’s Work From Home We … Continue reading

Would Homer Simpson Protect Virtualized Servers? (Hacktivism #5)
avatar

Problem to Solve:   What can we do to protect our Virtualized Server Infrastructure and Application Services against Hacktivism?   OK, I don’t know exactly what Homer Simpson thinks about virtualized servers, but do have a guess on his reaction. 🙂   So the … Continue reading