meta_pixel
Tapesearch Logo
Log in
Dissecting Popular IT Nerds

311- Securing the Mid-Market: Tom Shock’s Step by Step Approach to Cybersecurity

Dissecting Popular IT Nerds

Dissecting Popular IT Nerds

Technology

549 Ratings

🗓️ 12 August 2024

⏱️ 58 minutes

🧾️ Download transcript

Summary

Tom Shock Tom Shock is a seasoned IT professional with over 15 years of experience modernizing technology environments in mid-market organizations. Currently serving as the Director of IT at Shepherd Electric Supply, Tom is known for his hands-on approach, instilling  a customer service-oriented IT culture. His leadership style focuses on cultivating engagement and passion within his team by providing opportunities, guidance, and autonomy. Throughout his tenure, he has driven accelerated growth, improved efficiency, and enhanced productivity. While Tom’s primary expertise lies in IT modernization, he also possesses significant knowledge of cybersecurity, especially in addressing the unique challenges faced by companies with 200-1000 employees. His pragmatic approach ensures that security solutions are both effective and aligned with business operations. Securing the Mid-Market: Tom Shock’s Step by Step Approach to Cybersecurity How can mid-market companies protect themselves against cyber threats without breaking the bank? Tom Shock, Director of IT at Shepard Electric Supply, shares his expertise on implementing effective cybersecurity measures for mid-sized businesses. From endpoint detection to email security and beyond, Tom outlines practical steps companies can take to strengthen their defenses, emphasizing the importance of a layered approach and continuous improvement.

Transcript

Click on a timestamp to play from that location

0:00.0

Well, welcome back to another episode of dissecting popular IT nerd, your host, Mike Kelly, and today we've got Tom Schock, who is the director of IT over at Shepherd Electric Supply in Annapolis, Maryland.

0:17.0

So Tom, why don't you go ahead and introduce yourself?

0:19.9

Tell us a little about your history

0:21.5

and why you consider yourself a nerd or a geek?

0:25.4

Sure, thanks. So I am the director of IT at a mid-market wholesaler of electrical supplies.

0:33.3

Shepard Electric has seven locations in the Maryland, Virginia, Washington, D.C. region.

0:39.7

We have about 350 employees, and we have about 500 million per year in revenue.

0:46.6

So, you know, my expertise is really in the overlap between cybersecurity and mid-market.

0:57.1

You know, I've been in the mid-market space for a better part of 20 years at three different

1:04.9

companies, all distributors of some sort. So, you know, the experience of addressing cybersecurity at those

1:15.5

companies has just given me an insight into what that's like because it is different. You know,

1:22.8

there are challenges for mid-market companies when they try to address cybersecurity, but then there are also

1:27.8

some things that make it a little easier. And those are the kind of the things I'd like to highlight

1:32.1

as we talk to our session today. Yeah, you know, with my experience, I didn't have experience

1:39.6

at multiple organizations, but I was at a mid-market and I helped them grow through quite a bit.

1:46.8

They were emerging or getting to that emerging side of enterprise.

1:52.5

And, you know, we were up to like 40 locations, eight different lines of business and everything

1:57.5

else. And I am going to make the assumption that the challenges that you're talking about

2:03.2

is the fact that they're not one of the big guys and they don't have the big budget

2:06.5

to be able to just go buy all the shinies.

2:10.4

But the advantage that the midmarket has compared to some of those big guys is their agility and their ability to quickly address

2:21.3

multiple things and or to have immediate access to those different things. Everything's not so

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from Dissecting Popular IT Nerds, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of Dissecting Popular IT Nerds and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.