June 2025 Tech Upload

The NEW Digital Alliance would like to thank Smart IS International, TDS, & Thrivent for their support as Executive Level investors!

NEW Digital News

NEW Digital Leaders Conference Delivers Insight and Inspiration

The 2025 NEW Digital Leaders Conference, held on May 29 at Kimberly-Clark’s Neenah Conference Center, brought together IT professionals and industry leaders from across Northeast Wisconsin to explore the future of digital transformation. Organized by the NEW Digital Alliance in collaboration with Women in Technology Wisconsin, the event offered a dynamic agenda focused on the tools, trends, and leadership strategies shaping the digital landscape.

Key themes included the rise of digital enablers, strategies for building and retaining tech talent, and the evolving role of leadership in driving innovation. Attendees delved into emerging technologies such as AI, IoT, and cloud computing, while also examining the growth of digital platforms and the expanding demand for data center infrastructure. The conference provided a valuable platform for networking, knowledge-sharing, and aligning on strategies to advance digital capabilities across the region.

2025 NEW Digital Leaders Conference 🙌 A huge THANK YOU to our sponsors: Thrivent, Smart IS International & New Resources Consulting for making this event possible. Your partnership helps make impactful events like this possible, bringing together and empowering digital leaders from across our region. We’re also incredibly grateful to our amazing presenters for sharing their insight, and to all the attendees who showed up ready to learn, grow, and lead.

Shoutout to photographer Kevin Virobik for beautifully capturing the energy, excitement, and connection throughout the day!

NEW Digital Alliance Investment Renewals

As we head into the summer season, that means our end of the fiscal year approaches for the NEW Digital Alliance. Here are a few highlights from our 2024-2025 year:

  • First ever NEW Digital Tech Leaders Conference, in partnership with Women in Technology; ran twice with over 300+ total attendees
  • 11 Virtual Roundtables with 300+ participants throughout the year
  • Completed 3rd and 4th cohorts of the Investor Mentorship Program; 40 total participants between both cohorts
  • Hosted first ever Wisconsin Tech Month Kick-Off event in partnership with Amplify Oshkosh & Women in Technology; 60+ people in attendance
  • Seven new NEWDA investors
  • Held second annual Tech Summit: AI’s impact, one year later. Where are we now?; 150+ attendees
  • Hosted second annual Careers to Explore: Technology Career Exhibit serving almost 100 area high school juniors and seniors
  • Ran two Tech Training Cohorts on AI in Leadership as part of a Microsoft/Linked In Learning grant; almost 50 participants

As we move forward into the 2025-26 fiscal year, it is time for investment renewals. We will begin to send out renewal invoices to current investors starting here in June for the upcoming 2025-26 fiscal year. 

Want to become an investor? Fill out our online Investment Form here.

Upcoming northeast Wisconsin IT events

Apprenticeships: Building Your Bench and Filling Your Need
Tuesday, June 3
12 – 1 p.m.
Virtual

Organizer: Bay Area Workforce Development Board

New North Summit
Thursday, June 5
8:30 a.m. – 4:30 p.m.
Lambeau Field Atrium

Organizer: New North

Know Your Worth: Pay Transparency & Negotiation in Tech
Friday, June 6
12 – 1 p.m.
Virtual

Organizer: Women in Technology

NEWDA Cybersecurity Roundtable
Monday, June 16
10 – 11 a.m.
Virtual 

Organizer: NEW Digital Alliance

Sip & Sync
Wednesday, June 18
8:30 – 9:30 a.m.
Copper Rock Coffee Company (College Ave)

Organizer: Women in Technology

Resilience by Design: AI, Risk, & Security in Motion
Wednesday, June 18
11:30 a.m. – 4:30 p.m.
Bridgewood Resort Hotel Neenah

Organizer: EDCi

Labor Market Insights: May 2025

The Carex Labor Market Index (LMI) was created to provide a clear, data-driven view of the U.S. labor market’s overall health. In response to frequent questions from both employers and job seekers—“How’s the job market doing?”—the LMI offers a quantifiable answer grounded in objective data, not speculation. The Carex LMI is calculated using eight key data sets, including job openings, unemployment rates, layoffs, and more. These data points are weighted and combined to produce a monthly score out of 100 that reflects current market conditions and directional movement.

The May LMI came in at 60.9, indicating a market that is stable but showing signs of slowdown.

Read full article here

Congratulations to the Class of 2025 – Northeast Wisconsin’s Newest Tech Talent!

Photo credit: FVTC

Photo credit: NWTC

Photo credit: MPTC

As the academic year wraps up, we extend our heartfelt congratulations to the Class of 2025 IT and tech professional graduates from colleges and universities throughout the New North region! These graduates have worked hard to develop the skills and knowledge needed to launch successful careers in IT and technology—and our region is better for it. Whether they’re heading into cybersecurity, software development, data analytics, networking, or tech support roles, these talented individuals represent the next wave of innovation in Northeast Wisconsin.

We’re proud to celebrate their achievements and look forward to seeing the impact they’ll make across industries. To the newest members of the tech workforce: welcome, and thank you for choosing a future in technology. We can’t wait to see what you accomplish!

Other IT News

The edge devices security risk: What leaders can do

Photo credit: Getty Images

By  
ITpro.

Edge devices—such as firewalls, routers, and VPNs—have become significant security vulnerabilities for small and medium-sized businesses. According to Sophos’ Annual Threat Report, nearly 30% of initial cyberattack compromises in the past year involved these devices, with VPNs accounting for over 25% of incidents and ransomware attacks. The widespread use of legacy infrastructure and end-of-life devices exacerbates the issue, as these outdated systems often lack necessary patches and are easily discoverable through tools like Shodan.io. Their direct exposure to the internet and minimal security features make them attractive targets for attackers seeking quick access to business networks.

To mitigate these risks, experts recommend several proactive measures. Implementing continuous security monitoring and forwarding logs from edge devices to centralized systems can aid in detecting and responding to threats promptly. Regular external vulnerability scanning helps identify issues like missing patches and misconfigurations. Adopting a zero trust network architecture (ZTNA) minimizes attack surface exposure by enforcing secure, identity-aware access. Additionally, disabling public-facing administrative interfaces and ensuring that vendors have strong patch management and vulnerability disclosure practices are crucial steps. Training staff on the risks associated with edge devices and conducting incident response drills starting at the network edge further strengthen an organization’s security posture.

Read full article here

New Guidance for SIEM and SOAR Implementation

Cybersecurity & Infrastructure Security Agency logo America’s Cyber Security Defense Agency National Coordinator For Critical Infrastructure Security and Resilience

By: Cybersecurity & Infrastructure Security Agency

Today, CISA, in collaboration with the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) and other international and U.S. partners, released new guidance for organizations seeking to procure Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR) platforms.

This guidance includes the following three resources:

  • Implementing SIEM and SOAR Platforms – Executive Guidance outlines how executives can enhance their organization’s cybersecurity framework by implementing these technologies to improve visibility into network activities, enabling swift detection and response to cyber threats.
  • Implementing SIEM and SOAR Platforms – Practitioner Guidance focuses on how practitioners can quickly identify and respond to potential cybersecurity threats and leverage these technologies to streamline incident response processes by automating predefined actions based on detected anomalies.
  • Priority Logs for SIEM Ingestion – Practitioner Guidance offers insights for prioritizing log ingestion into a SIEM, ensuring that critical data sources are effectively collected and analyzed to enhance threat detection and incident response capabilities tailored for organizations.

CISA encourages organizations to review this guidance and implement the recommended best practices to strengthen their cybersecurity. For access to the guidance documents, please visit CISA’s SIEM and SOAR Resource page.

Read original article with link to Guidance here

The great AI jobs disruption is under way

Photo credit: Getty Images

By: The Editorial Board
Financial Times

The Financial Times article titled “The great AI jobs disruption is under way” discusses the transformative impact of artificial intelligence on the job market. It highlights the significant layoffs in the tech industry, with at least 95,000 workers at US-based tech companies losing their jobs last year, according to Crunchbase. The article delves into how AI is automating tasks across various sectors, leading to both the displacement of certain roles and the creation of new opportunities. It emphasizes the need for workers to adapt to the changing landscape by acquiring new skills and for policymakers to address the challenges posed by this technological shift.

Furthermore, the piece examines the broader implications of AI integration into the workforce, including the potential for increased productivity and economic growth. However, it also raises concerns about the pace of change and the readiness of institutions to manage the transition effectively. The article underscores the importance of proactive measures to ensure that the benefits of AI are equitably distributed and that support systems are in place for those affected by job disruptions.

Read full article here

AI is the greatest threat—and defense—in cybersecurity today. Here’s why.

Photo credit: McKinsey & Company

By: Charlie Lewis, Ida Kristensen, and Jeffrey Caso with Julian Fuchs
McKinsey & Company

AI is transforming cybersecurity as both a major threat and a powerful defense. Cybercriminals are using AI to rapidly increase the speed and sophistication of attacks—often breaking through defenses in under an hour. Tools like deepfakes, AI-generated phishing, and malicious code injections help attackers craft personalized and convincing threats that evade traditional security systems. AI also enables real-time adaptation to targets’ defenses, making social engineering tactics like impersonation and spear phishing more effective and dangerous.

On the defensive side, AI empowers organizations to better detect, respond to, and recover from threats. It can analyze massive datasets in real time to spot anomalies, flag suspicious behavior, and even predict vulnerabilities before they are exploited. AI helps reverse-engineer malware, detect unusual login patterns, and automate routine cybersecurity tasks. This allows human teams to focus on more complex threats. Emerging “agentic AI” will further automate security operations by assisting with alert triage, investigation, and response. As AI advances, organizations must stay ahead by adopting AI-driven defenses to combat increasingly AI-powered cyberattacks.

Read full article here