Dr. Darren Pulsipher, Chief Enterprise Architect for Public Sector, author and professor, investigates effective change leveraging people, process, and technology. Which digital trends are a flash in the pan—and which will form the foundations of lasting change? With in-depth discussion and expert interviews, Embracing Digital Transformation finds the signal in the noise of the digital revolution.
People
Workers are at the heart of many of today’s biggest digital transformation projects. Learn how to transform public sector work in an era of rapid disruption, including overcoming the security and scalability challenges of the remote work explosion.
Processes
Building an innovative IT organization in the public sector starts with developing the right processes to evolve your information management capabilities. Find out how to boost your organization to the next level of data-driven innovation.
Technologies
From the data center to the cloud, transforming public sector IT infrastructure depends on having the right technology solutions in place. Sift through confusing messages and conflicting technologies to find the true lasting drivers of value for IT organizations.
Printers aren’t harmless office tools—they’re one of the most overlooked cybersecurity threats in your network. Dr. Darren welcomes IoT security expert Jim LaRoe to expose how these “benign” devices quietly hold admin credentials, store sensitive data, and open doors to attackers. What seems mundane may be your biggest vulnerability.
Key Takeaways
Printers make up ~20% of enterprise endpoints, yet most remain unprotected
Many devices store administrator-level credentials, making lateral attacks easy
Default passwords and “set-it-and-forget-it” practices create massive risk exposure
Printers act as full-fledged servers (email, FTP, web), not simple peripherals
Security gaps are often organizational and cultural, not just technical
Effective protection requires ownership, budget, and enforced standards
Chapters
00:00 The shocking reality of printer vulnerabilities
00:56 Meet Jim LaRoe: engineer turned cybersecurity leader
04:02 Why printers never disappeared—and why that matters
06:37 The 360° threat landscape of printer endpoints
10:16 Real-world printer hacks and Shodan exposure
13:38 Printers as the “Mount Everest” of IoT complexity
17:23 How attackers steal credentials from printers
20:20 Why organizations ignore printer security risks
23:03 The hidden cost of certificates and identity management
24:49 A scalable approach to securing printer fleets
29:07 Educating leaders and building organizational awareness
See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.