POPULARITY
Tom Kemp is a Silicon Valley-based entrepreneur, seed investor, policy advisor and author of the award-winning bestseller Containing Big Tech: How to Protect our Civil Rights, Economy, and Democracy. Tom was the founder and CEO of Centrify, a leading cybersecurity cloud provider. As an angel investor, he's made seed investments in over fifteen tech start-ups. He has also served as a volunteer technology policy advisor for political campaigns, legislators, and civil society groups. His advocacy work includes leading the campaign marketing efforts in 2020 to pass the California Privacy Rights Act, and advising and contributing to the passage of state privacy laws in 2023, such as the California Delete Act and Texas' data broker registry law. In 2024, Tom collaborated with advocacy groups and legislative leaders on the California AI Transparency Act.In this conversation with Greg Olear, Tom Kemp discusses the implications of Elon Musk's actions in the political landscape, the significance of the Delete Act for data privacy, the complexities of AI technology, and the current state of antitrust actions against big tech companies. The dialogue explores the intersection of technology, politics, and civil rights, emphasizing the need for regulatory frameworks to protect democracy and individual freedoms.Follow Tom:https://x.com/TomKemp00Visit his website:https://www.tomkemp.ai/Buy his book:https://www.tomkemp.ai/containing-big-tech Subscribe to The Five 8:https://www.youtube.com/channel/UC0BRnRwe7yDZXIaF-QZfvhACheck out ROUGH BEAST, Greg's new book:https://www.amazon.com/dp/B0D47CMX17ROUGH BEAST is now available as an audiobook:https://www.audible.com/pd/Rough-Beast-Audiobook/B0D8K41S3T Would you like to tell us more about you? http://survey.podtrac.com/start-survey.aspx?pubid=BffJOlI7qQcF&ver=short
Today Laura and Kevin chat with Tom Kemp about angel investing and venture capital money. Tom breaks down his process for selecting investments. We also discuss his new book.Tom Kemp is a Silicon Valley-based entrepreneur, investor, and policy advisor. Tom is also the author of Containing Big Tech: How to Protect Our Civil Rights, Economy, and Democracy. Tom was the founder and CEO of Centrify, a leading cybersecurity cloud provider that amassed over two thousand enterprise customers, including over 60 percent of the Fortune 50. For his leadership, Tom was named by Ernst & Young as Finalist for Entrepreneur of the Year in Northern California. Tom is also an active Silicon Valley angel investor, with seed investments in over a dozen tech start-ups with a focus on privacy and cybersecurity. In addition, Tom has served as a technology policy advisor for political campaigns and advocacy groups, including leading the campaign marketing efforts in 2020 to pass California Proposition 24—the California Privacy Rights Act (CPRA)—and co-authoring bills such as the California Delete Act of 2023. Tom holds a Bachelor of Science degree in computer science and in history from the University of Michigan.
My guest today is a Silicon Valley-based entrepreneur, investor, and policy advisor. He is also the author of Containing Big Tech: How to Protect Our Civil Rights, Economy, and Democracy. He was the founder and CEO of Centrify, a leading cybersecurity cloud provider that amassed over two thousand enterprise customers, including over 60 percent of the Fortune 50. For his leadership, he was named by Ernst & Young as Finalist for Entrepreneur of the Year in Northern California. He is also an active Silicon Valley angel investor, with seed investments in over a dozen tech start-ups with a focus on privacy and cybersecurity. In addition, he has served as a technology policy advisor for political campaigns and advocacy groups, including leading the campaign marketing efforts in 2020 to pass California Proposition 24—the California Privacy Rights Act (CPRA)—and co-authoring bills such as the California Delete Act of 2023. He holds a Bachelor of Science degree in computer science and in history from the University of Michigan. It's time to think outside the lines with Tom Kemp. For more information about Tom: https://www.tomkemp.ai/home https://twitter.com/TomKemp00 For more information about this podcast: https://www.thinkoutsidethelines.com
Tom Kemp, former CEO of Centrify, discusses his book Containing Big Tech: How to Protect Our Civil Rights, Economy, and Democracy.Hosts: Carol Massar and Tim Stenovec. Producer: Paul Brennan. See omnystudio.com/listener for privacy information.
EPISODE 1666: In this KEEN ON show, Andrew talks to Tom Kemp, the author of CONTAINING BIG TECH, about the existential political and economic dangers of Google, Facebook, Amazon and Apple Named as one of the "100 most connected men" by GQ magazine, Andrew Keen is amongst the world's best known broadcasters and commentators. In addition to presenting KEEN ON, he is the host of the long-running How To Fix Democracy show. He is also the author of four prescient books about digital technology: CULT OF THE AMATEUR, DIGITAL VERTIGO, THE INTERNET IS NOT THE ANSWER and HOW TO FIX THE FUTURE. Andrew lives in San Francisco, is married to Cassandra Knight, Google's VP of Litigation & Discovery, and has two grown children. Tom Kemp is a Silicon Valley–based CEO, entrepreneur, and investor. Tom was the founder and CEO of Centrify (renamed Delinea in 2022), a leading cybersecurity cloud provider that amassed over two thousand enterprise customers, including over 60 percent of the Fortune 50. For his leadership, Tom was named by Ernst & Young as a finalist for Entrepreneur of the Year in Northern California. Tom is also an active Silicon Valley angel investor, with seed investments in over a dozen tech start-ups. In addition, Tom has served as a technology policy advisor for political campaigns and advocacy groups, including leading the campaign marketing efforts in 2020 to pass California Proposition 24―the California Privacy Rights Act (CPRA)―and co-drafting bills such as the California Delete Act of 2023. Tom writes extensively on technology policy on his blog (tomkemp.ai) and has been interviewed by the Guardian, Politico, the Washington Post, CNBC, Fox News, and others. Tom holds a bachelor of science degree in computer science and in history from the University of Michigan. You can follow Tom on Twitter at @TomKemp00. Learn more about your ad choices. Visit megaphone.fm/adchoices
Tom Kemp, former CEO of Centrify, discusses his book Containing Big Tech: How to Protect Our Civil Rights, Economy, and Democracy.Hosts: Carol Massar and Tim Stenovec. Producer: Paul Brennan. See omnystudio.com/listener for privacy information.
Episode Summary In this episode of Sunny Side Up, host Erik Blaze interviews Mary Gilbert, CMO at Folloze, who shares her expertise on navigating the new marketing landscape and ABM-driven strategies. The conversation covers the concept of agility as a prominent factor for CMOs, the importance of customer engagement as a valuable asset, and the need for a holistic and personalized approach. Mary emphasizes the shift from traditional demand generation to ABM on steroids, combining insights, targeting, and measurement. They also discuss the integration of third-party and first-party intent signals, the transition from outreach emails to a value-added engagement approach, and the significance of ABM-driven demand gen. About the Guest Mary, CMO at Folloze, has over 20 years of experience in leading integrated B2B marketing organizations. She led digital transformation for Microsoft, HP, and Cisco, introducing B2B buyer journey alignment. Mary launched early ABM programs for companies like Centrify, Microsoft, and Ingram Micro CloudBlue. Passionate about team culture, organizational effectiveness, and digital transformation, she offers a unique perspective on market dynamics. Connect with Mary Gilbert Key Takeaways - The concept of agility has become increasingly prominent in the minds of CMOs, as companies need to adapt quickly to the digital-first environment and evolving market dynamics. - Engagement is the new currency of pipeline momentum, serving as a beacon of insight and guiding every action of the entire go-to-market team. - CMOs must effectively drive engagement and utilize it as a valuable asset for building a robust and predictable pipeline. - Traditional go-to-market strategies and conventional demand generation methods, such as relying solely on MQLs are losing momentum in today's landscape. - The integration of third-party and first-party intent signals provides valuable insights for personalized engagement and supporting buyers throughout their journey. - Ineffective use and understanding of data systems can be a common hurdle for organizations, and it's important to have experts who can maximize the potential of marketing technologies. - Centralization and decentralization need to be balanced in organizational design to empower frontline marketers and enable personalized experiences while maintaining brand integrity. - Revenue teams should transition from solely relying on outreach emails to providing a holistic engagement approach that focuses on value creation for customers. - Aligning sales and marketing metrics and strategies and developing coordinated plays that support personalized information and leverage intent signals is crucial. - Breaking down silos and ensuring everyone has access to the same experience platform and data helps create a seamless experience for buyers. - Marketing operations (MOPS) teams play a vital role in transformation and should be considered a valuable resource for insights and strategic implementations. - ABM-driven demand gen model is gaining popularity among CMOs as a means to not only survive but thrive in the current market space, offering scalability, personalization, and agility. - Leveraging available data and insights enhances decision-making and optimizes team efficiency, resulting in an enhanced buyer experience. Quote “Technology is moving way faster than humans can adapt, and we're all still trying to catch up.” – Mary Gilbert Recommended Resources Books Scott Brinker's Chiefmartec Sam Jacobs' Pavillion Community Shout-outs Jon Miller – CMO at Demandbase Jessica Kao – Senior Director, Marketing Operations and Martech at Cloudflare Jason Widup – VP of Marketing at metadata.io Connect with Mary Gilbert | Follow us on LinkedIn | Website |
"You've got to give some recommendations. You just can't say here's all the bad stuff, you figure it out. No, you need to provide a roadmap and guidelines. And what I wanted to do is allow customers to connect the dots between the issues that we are facing from society when we have this significant overcollection of data, the increasing ways that AI is being used, and how it can introduce bias or even be exploited with dark patterns and deep fakes. Things that your listeners care a lot about.”Brace yourself for a thought-provoking episode with Tom Kemp, Silicon Valley-based policy advisor and the author of "Containing Big Tech: How to Protect Our Civil Rights, Economy, and Democracy."In this episode, we discuss:Tom's involvement with the California Privacy Rights and his experience co-authoring the California Delete Act of 2023Benefits and threats to look out for with the rise of Big TechActionable solutions to curtail surveillance and tech monopoliesHow privacy can be a selling point for any organisation How Privacy Pros can lead the charge to preserve privacy rightsGet ready to be inspired!Tom Kemp is a Silicon Valley-based entrepreneur, investor, and policy advisor. Tom is also the author of Containing Big Tech: How to Protect Our Civil Rights, Economy, and Democracy. Tom was the founder and CEO of Centrify, a leading cybersecurity cloud provider that amassed over two thousand enterprise customers, including over 60 percent of the Fortune 50. For his leadership, Tom was named by Ernst & Young as Finalist for Entrepreneur of the Year in Northern California. Tom is also an active Silicon Valley angel investor, with seed investments in over a dozen tech start-ups with a focus on privacy and cybersecurity. In addition, Tom has served as a technology policy advisor for political campaigns and advocacy groups, including leading the campaign marketing efforts in 2020 to pass California Proposition 24—the California Privacy Rights Act (CPRA)—and co-authoring bills such as the California Delete Act of 2023. Tom holds a Bachelor of Science degree in computer science and in history from the University of Michigan. Connect with Tom at his website or on LinkedIn or Twitter.If you're ready to transform your career and become the go-to GDPR expert, download the first chapter of 'The Easy Peasy Guide To The GDPR' here: https://www.bestgdprbook.com/Follow Jamal on LinkedIn: https://www.linkedin.com/in/kmjahmed/Follow Tom on LinkedIn: https://www.linkedin.com/in/tomkemp/Get Exclusive Insights, Secret Expert Tips & Actionable Resources For A Thriving Privacy Career That We Only Share With Email Subscribers►
One of the biggest dangers comes from the way that big tech companies collect and use our personal data. How do we contain big tech to protect our data and privacy? Our guest Tom Kemp is publishing a book on this topic and will discuss with Punit Bhatia the privacy trends, upcoming privacy laws like Delete Act, and the ways that the users are protected. KEY CONVERSATION POINTS 0:01 Intro 0:28 GDPR in one word 1:30 Containing Big Tech 6:11 Practical tips for protecting privacy 10:55 Global Privacy Control 12:48 What are data brokers? 16:29 California privacy trends – CCPA, CPRA, Age Appropriate & Delete Act 20:36 Silicon valley view on privacy 25:40 Privacy investments 30:46 Closing ABOUT THE GUEST Tom Kemp is a Silicon Valley-based author, entrepreneur, investor, and policy advisor. Tom is the author of Containing Big Tech: How to Protect Our Civil Rights, Economy, and Democracy. Tom was the founder and CEO of Centrify, a leading cybersecurity cloud provider that amassed over two thousand enterprise customers, including over 60 percent of the Fortune 50. For his leadership, Tom was named by Ernst & Young as Finalist for Entrepreneur of the Year in Northern California. Tom is also an active Silicon Valley angel investor, with seed investments in over a dozen tech start-ups with a focus on privacy and cybersecurity. In addition, Tom has served as a technology policy advisor for political campaigns and advocacy groups, including leading the campaign marketing efforts in 2020 to pass California Proposition 24—the California Privacy Rights Act (CPRA)—and co-authoring bills such as the California Delete Act of 2023. Tom holds a Bachelor of Science degree in computer science and in history from the University of Michigan. Connect with Tom at his website or on LinkedIn or Twitter. ABOUT THE HOST Punit Bhatia is one of the leading privacy experts who works independently and has worked with professionals in over 30 countries. Punit works with business and privacy leaders to create an organization culture with high privacy awareness and compliance as a business priority. Selectively, Punit is open to mentor and coach privacy professionals. Punit is the author of books “Be Ready for GDPR” which was rated as the best GDPR Book, “AI & Privacy – How to Find Balance”, “Intro To GDPR”, and “Be an Effective DPO”. Punit is a global speaker who has spoken at over 30 global events. Punit is the creator and host of the FIT4PRIVACY Podcast. This podcast has been featured amongst top GDPR and privacy podcasts. As a person, Punit is an avid thinker and believes in thinking, believing, and acting in line with one's value to have joy in life. He has developed the philosophy named ‘ABC for joy of life' which passionately shares. Punit is based out of Belgium, the heart of Europe. RESOURCES Websites www.fit4privacy.com , www.punitbhatia.com Podcast https://www.fit4privacy.com/podcast Blog https://www.fit4privacy.com/blog YouTube http://youtube.com/fit4privacy --- Send in a voice message: https://podcasters.spotify.com/pod/show/fit4privacy/message
Tom Kemp is a Silicon Valley-based entrepreneur, investor, author, and policy advisor. Tom is the author of the book Containing Big Tech: How to Protect Our Civil Rights, Economy, and Democracy (August 2023). Tom was the founder and CEO of Centrify (renamed Delinea in 2022), a leading cybersecurity cloud provider that amassed over two thousand enterprise customers, including over 60 percent of the Fortune 50. For his leadership, Tom was named by Ernst & Young as Finalist for Entrepreneur of the Year in Northern California. Tom is also an active Silicon Valley angel investor, with seed investments in over a dozen tech start-ups. In addition, Tom has served as a technology policy advisor for political campaigns and advocacy groups, including leading the campaign marketing efforts in 2020 to pass California Proposition 24—the California Privacy Rights Act (CPRA)—and co-authoring the California Delete Act of 2023. ContainingBigTech.com - link to "Containing Big Tech: How to Protect Our Civil Rights, Economy, and Democracy" --- Send in a voice message: https://podcasters.spotify.com/pod/show/virtual-ciso-moment/message
Digital privacy and protecting our personal data online is incredibly important, now more than ever. Big Tech companies collecting more and more sensitive information and using it in ways we might not even be aware of. Tom Kemp is here today to talk about what the large corporations are doing with our information, and what we can do to better protect ourselves and future generations as we move into Web3. This week, episode 166 of the Tech Intersect™ Podcast is about containing Big Tech and digital privacy!POWERED BY ADVANTAGE EVANS™ ACADEMY Fast-track your journey from cash to crypto with the Digital Money DEMYSTIFIED Quick Start Bundle now at DigitalMoneyDemystified.com. The bundle includes the Future of Wealth FUNdamentals Mini Online Mini Course, From Cash to Crypto™️ FastTrack Toolkit and a special info-rich BONUS Resource Bank. Visit DigitalMoneyDemystified.com and get started today.Tom Kemp is a Silicon Valley-based author of the forthcoming book Containing Big Tech: How to Protect Our Civil Rights, Economy, and Democracy, as well as an entrepreneur, investor, and policy advisor. Tom was the Founder and CEO of Centrify, renamed Delinea 2020, a leading cybersecurity cloud provider that amassed over 2000 enterprise customers, including over 60% of the Fortune 50.Some of the talking points Tom and I go over in this episode include:How data collection by Big Tech companies could be used to affect the future of work via discrimination.What everyday citizens can do to help protect their personal data online.Big Tech's dominant position stifles entrepreneurship, innovation, and competition.How Big Tech is ‘too big to care' - instead of ‘too big to fail'Thank you for listening! If you enjoyed this episode, take a screenshot of the episode to post in your stories and tag me! And don't forget to follow, rate, and review the podcast and tell me your key takeaways!CONNECT WITH TOM KEMP:LinkedInWebsiteTwitterCONNECT WITH DR. TONYA M. EVANS:Questions and requests: hello@techintersectpodcast.com Follow: Twitter @AtTechIntersect | Instagram @TechIntersect Web: Tech Intersect Podcast Connect for exclusive content: https://advantageevans.activehosted.com/f/6 Regulate & The Rabbit Hole by Notty Prod licensed via Creative Commons Attribution-NoDerivatives 4.0 International License. Produced by Tonya M. Evans for Advantage Evans, LLC
One of the biggest dangers comes from the way that big tech companies collect and use our personal data. How do we contain big tech to protect our data and privacy? Our guest Tom Kemp is publishing a book on this topic and will discuss with Punit Bhatia the privacy trends, upcoming privacy laws like Delete Act, and the ways that the users are protected. ABOUT THE GUEST Tom Kemp is a Silicon Valley-based author, entrepreneur, investor, and policy advisor. Tom is the author of Containing Big Tech: How to Protect Our Civil Rights, Economy, and Democracy. Tom was the founder and CEO of Centrify, a leading cybersecurity cloud provider that amassed over two thousand enterprise customers, including over 60 percent of the Fortune 50. For his leadership, Tom was named by Ernst & Young as Finalist for Entrepreneur of the Year in Northern California. Tom is also an active Silicon Valley angel investor, with seed investments in over a dozen tech start-ups with a focus on privacy and cybersecurity. In addition, Tom has served as a technology policy advisor for political campaigns and advocacy groups, including leading the campaign marketing efforts in 2020 to pass California Proposition 24—the California Privacy Rights Act (CPRA)—and co-authoring bills such as the California Delete Act of 2023. Tom holds a Bachelor of Science degree in computer science and in history from the University of Michigan. Connect with Tom at his website or on LinkedIn or Twitter. ABOUT THE HOST Punit Bhatia is one of the leading privacy experts who works independently and has worked with professionals in over 30 countries. Punit works with business and privacy leaders to create an organization culture with high privacy awareness and compliance as a business priority. Selectively, Punit is open to mentor and coach privacy professionals. Punit is the author of books “Be Ready for GDPR” which was rated as the best GDPR Book, “AI & Privacy – How to Find Balance”, “Intro To GDPR”, and “Be an Effective DPO”. Punit is a global speaker who has spoken at over 30 global events. Punit is the creator and host of the FIT4PRIVACY Podcast. This podcast has been featured amongst top GDPR and privacy podcasts. As a person, Punit is an avid thinker and believes in thinking, believing, and acting in line with one's value to have joy in life. He has developed the philosophy named ‘ABC for joy of life' which passionately shares. Punit is based out of Belgium, the heart of Europe. RESOURCES Websites www.fit4privacy.com , www.punitbhatia.com Podcast https://www.fit4privacy.com/podcast Blog https://www.fit4privacy.com/blog YouTube http://youtube.com/fit4privacy --- Send in a voice message: https://podcasters.spotify.com/pod/show/fit4privacy/message
This week's guest is Tom Kemp: author; entrepreneur; former Co-Founder & CEO of Centrify (now called Delinia), a leading cybersecurity cloud provider; and a Silicon Valley-based Seed Investor and Policy Advisor. Tom led campaign marketing efforts in 2020 to pass California Proposition 24, the California Privacy Rights Act, (CPRA), and is currently co-authoring the California Delete Act bill.In this conversation, we discuss chapters within Tom's new book, Containing Big Tech: How to Protect Our CIVIL RIGHTS, ECONOMY, and DEMOCRACY; how big tech is using AI to feed into the attention economy; what should go into a U.S. federal privacy law and how it should be enforced; and a comprehensive look at some of Tom's privacy tech investments. Topics Covered:Tom's new book - Containing Big Tech: How to Protect Our Civil Rights, Economy and DemocracyHow and why Tom's book is centered around data collection, artificial intelligence, and competition. U.S. state privacy legislation that Tom helped get passed & what he's working on now, including: CPRA, the California Delete Act, & Texas Data Broker RegistryWhether there will ever be a U.S. federal, omnibus privacy law; what should be included in it; and how it should be enforcedTom's work as a privacy tech and security tech Seed Investor with Kemp Au Ventures and what inspires him to invest in a startup or notWhat inspired Tom to invest in PrivacyCode, Secuvy & Privaini Why having a team and market size is something Tom looks for when investing. The importance of designing for privacy from a 'user-interface perspective' so that it's consumer friendlyHow consumers looking to trust companies are driving a shift left movementTom's advice for how companies can better shift left in their orgs & within their business networksResources Mentioned:The California Consumer Privacy Act (amended by the CPRA)The California Delete ActGuest Info:Follow Tom on LinkedInKemp Au VenturesPre-order Containing Big Tech: How to Protect Our CIVIL RIGHTS, ECONOMY, and DEMOCRACY Privado.ai Privacy assurance at the speed of product development. Get instant visibility w/ privacy code scans.Shifting Privacy Left Media Where privacy engineers gather, share, & learnDisclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.Copyright © 2022 - 2024 Principled LLC. All rights reserved.
Silicon Valley-based entrepreneur Tom Kemp is the Managing Director of Kemp Au Ventures, an angel investment firm where he and his business partner invest their personal funds into seed and early-stage companies. As an angel investor, he has funded over 15 tech startups. Prior to becoming an investor, Tom was the Founder and CEO of Centrify, a leading cybersecurity cloud provider. As a result of his nearly 15 years in privacy, Tom devotes his time as a policy advisor for Californians for Consumer Privacy. His first book, Containing Big Tech: How to Protect Our Civil Rights, Economy, and Democracy, a definitive book on Big Tech, will be available for purchase in August. In this episode… In April, the California Delete Act was introduced in the California State Senate, a measure seeking to give state residents the right to have their personal information deleted from websites and apps. While some people believe it necessary to protect privacy, others believe the legislation could be a burden for businesses. The California Delete Act risks creating a mass exodus for California companies — it could also jeopardize future investments in new products and services to collect personal information. With the ever-increasing collection of personal information by businesses, it's safe to say more needs to be done to protect individuals' privacy. So, is the California Delete Act too harsh or a step in the right direction? In this eye-opening episode of She Said Privacy/He Said Security Podcast, our hosts break down the California Delete Act with guest Tom Kemp, the Managing Director of Kemp Au Ventures. Together, these three privacy advisors inform us about everything we need to know about Senate Bill 362, the challenges of enforcing privacy laws, tips for reducing geolocation trackers, and more. This is one episode you don't want to miss, so get comfortable and tune in now!
“The best sales leaders are actually business leaders.” Murray Demo joins John McMahon and John Kaplan on a new episode of the Revenue Builders Podcast. A six-time CFO and board director for Citrix, Easy Software, Centrify, Qualtrics, and Lacework, Murray joins us to discuss the importance of the big picture for sales leaders. He explores how leaders can start to zoom out from just sales success into constructing a full-scale business strategy, and shares advice for CFOs and CROs approaching economic downturn.Everything is a trade-off when you're making complex business decisions, but how can you be sure you're making the best decision for the long-term health of your company? Murray suggests getting on the ground meeting people and staying informed on what's happening at every level of the organization. Dig into even more advice for sales leaders in this episode of Revenue Builders. Here are some key sections to check out: 08:29 The key metrics to look for in sales performance13:47 Balancing fiscal responsibility with agility20:40 Compensation programs' impact on company performance29:37 Expectations of cost justification and commitment42:38 Defining a good company56:31 Defining a down round and how to handle it Additional Resources:Connect with Murray Demo on LinkedIn: https://www.linkedin.com/in/murray-demo-59a31117/Visit the Lacework website: https://www.lacework.com/More resources for leaders facing economic change: https://forc.mx/3neLAR7 QUOTESMurray - Where the best leaders come from: “What I have found, though, is the best sales leaders are actually business leaders, they made a transition from carrying the bag and trying to make their number and tunnel vision and closing business, which is what you have to do to start your career, but as you progress up, the ones that are the most successful, they turn into business leaders and trying to solve a problem more at a company level than just for a specific sales oriented activity.” Check out John McMahon's book here: https://www.amazon.com/Qualified-Sales-Leader-Proven-Lessons/dp/0578895064
PAM ist nicht gleich PAM - dies hat uns der Merger von Thycotic und Centrify gelehrt. Netzpalaver sprach via Remote-Session mit Özkan Topal, Sales Director bei ThycoticCentrify, welche beiden PAMs bei dem Merger denn zusammenkommen, was sich seit der Ankündigung des Mergers in puncto Privileged-Access-Management bei ThycoticCentrify technisch als auch organisatorisch getan hat und ob der Merger demnächst unter einem neuen Firmennamen agiert.
Was ist das größte Sicherheitsrisiko dem sich Unternehmen und Behörden ausgesetzt sehen? Darüber sprach Netzpalaver via Remote-Session mit Andreas Müller, Director Large Accounts bei Thycotic Centrify. Außerdem erläuterte er, warum der Merger von Thycotic und Centrify anders als andere Merger sind und was die Kunden davon haben.
Shared security, also known as shared responsibility, is a cloud security management model that describes the distribution of enterprise data security management and accountability between a company and its cloud service provider(s). The framework essentially enables improved productivity and unparalleled agility, so why isn't every organization adopting it? In this episode, introduced by Neira Jones, Dr. Eric Cole, Founder and CEO of Secure Anchor Consulting,, explores adopting shared security as best practice. Dr. Eric speaks with Chris Martin, IAM Presales Solution Architect for EMEA at Thales. The podcast delves into the main areas of organizational risk concerning cloud migration and vendor native decisions before shedding light on the limitations of a single service provider. The guests then discuss the shared security model - its benefits and the implementation process. Final thoughts centre on what organizations need to understand about control over all users and effectively build a best practice shared security strategy You can also learn more about this topic in our new whitepaper, Owning Your Own Access Security. Dr Eric Cole Dr. Eric Cole is an industry-recognized expert with over 20 years of hands-on experience, founder and an executive leader at Secure Anchor Consulting where he provides leading-edge cybersecurity consulting services, expert witness work, and R&D initiatives to advance our field. Dr. Cole has experience in information technology with a focus on helping customers focus on the right areas of security by building out a dynamic defense. Dr. Cole has a master's degree in computer science from NYIT and a doctorate from Pace University with a concentration in information security. He served as CTO of McAfee and Chief Scientist for Lockheed Martin. Dr. Cole is the author of several books, including Advanced Persistent Threat, Hackers Beware, Hiding in Plain Sight, Network Security Bible 2nd Edition, and Insider Threat. You can connect with Dr Cole on LinkedIn. Chris Martin Chris Martin is the lead EMEA Pre-Sales Solution Architect at Thales. With over 20 years expertise in the IAM space, Chris' extensive background includes Enterprise SSO, PAM, IDaaS and Identity Governance that enables him to bring a holistic approach to enterprise IAM. Within Thales, Chris works alongside our customers to help them define, develop and execute their IAM strategies, either aligning Thales solutions to an existing IAM architecture or building from the ground up. Prior to joining Thales, Chris honed his IAM skills with Sentillion, Centrify, OneLogin, Omada and MicroFocus. You can connect with Chris on LinkedIn.
Jason Mitchell speaks on PAM when moving to the cloud. This conversation is brough to you by Centrify. Enjoy our exclusive RSA Conference Experience and make sure to subscribe Find James Azar Host of CyberHub Podcast, CISO Talk, Goodbye Privacy, Tech Town Square, Other Side of Cyber and CISOs Secrets James on Linkedin: https://www.linkedin.com/in/james-azar-a1655316/ James on Parler: @realjamesazar Telegram: CyberHub Podcast ****** Sign up for our newsletter with the best of CyberHub Podcast delivered to your inbox once a month: http://bit.ly/cyberhubengage-newsletter ****** Website: https://www.cyberhubpodcast.com Youtube: https://www.youtube.com/channel/UCPoU8iZfKFIsJ1gk0UrvGFw Facebook: https://www.facebook.com/CyberHubpodcast/ Linkedin: https://www.linkedin.com/company/cyberhubpodcast/ Twitter: https://twitter.com/cyberhubpodcast Instagram: https://www.instagram.com/cyberhubpodcast Listen here: https://linktr.ee/cyberhubpodcast Listen Here: https://linktr.ee/CISOtalk The Hub of the Infosec Community. Our mission is to provide substantive and quality content that's more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.
Brad Shewmark and Tony Goulding hop on the Tech Corner to discuss Modern Privileged Access Management: Just a Vault is Not Enough and share the latest in their findings and thought leadership on the topic. Enjoy our exclusive RSA Conference Experience and make sure to subscribe Find James Azar Host of CyberHub Podcast, CISO Talk, Goodbye Privacy, Tech Town Square, Other Side of Cyber and CISOs Secrets James on Linkedin: https://www.linkedin.com/in/james-azar-a1655316/ James on Parler: @realjamesazar Telegram: CyberHub Podcast ****** Sign up for our newsletter with the best of CyberHub Podcast delivered to your inbox once a month: http://bit.ly/cyberhubengage-newsletter ****** Website: https://www.cyberhubpodcast.com Youtube: https://www.youtube.com/channel/UCPoU8iZfKFIsJ1gk0UrvGFw Facebook: https://www.facebook.com/CyberHubpodcast/ Linkedin: https://www.linkedin.com/company/cyberhubpodcast/ Twitter: https://twitter.com/cyberhubpodcast Instagram: https://www.instagram.com/cyberhubpodcast Listen here: https://linktr.ee/cyberhubpodcast Listen Here: https://linktr.ee/CISOtalk The Hub of the Infosec Community. Our mission is to provide substantive and quality content that's more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.
Scott Englund and Dave McNeely share the know how's on DevOps and everything related to Machine Identities. I hope you enjoy this short yet useful session. Enjoy our exclusive RSA Conference Experience and make sure to subscribe Find James Azar Host of CyberHub Podcast, CISO Talk, Goodbye Privacy, Tech Town Square, Other Side of Cyber and CISOs Secrets James on Linkedin: https://www.linkedin.com/in/james-azar-a1655316/ James on Parler: @realjamesazar Telegram: CyberHub Podcast ****** Sign up for our newsletter with the best of CyberHub Podcast delivered to your inbox once a month: http://bit.ly/cyberhubengage-newsletter ****** Website: https://www.cyberhubpodcast.com Youtube: https://www.youtube.com/channel/UCPoU8iZfKFIsJ1gk0UrvGFw Facebook: https://www.facebook.com/CyberHubpodcast/ Linkedin: https://www.linkedin.com/company/cyberhubpodcast/ Twitter: https://twitter.com/cyberhubpodcast Instagram: https://www.instagram.com/cyberhubpodcast Listen here: https://linktr.ee/cyberhubpodcast Listen Here: https://linktr.ee/CISOtalk The Hub of the Infosec Community. Our mission is to provide substantive and quality content that's more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.
This week, In the first segment, Matt Cauthorn & Sri Sundaralingam from ExtraHop join us to discuss why Traditional IDS is Dead! Kimberly Sutherland from LexisNexis Risk Solutions will discuss The New Cybercrime Landscape! In the Enterprise Security News Thycotic and Centrify join forces, Netwrix acquires Strongpoint, SentinelOne plans for IPO, Qomplx plans to go public, and funding announcements from Axonius, HYAS, Armorblox and platform9. Attivo Networks Announces Continuous Assessment and Enforcement for AD, cPacket Networks announces cCloud, a network packet capture and analytics for Azure, Cavirin speeds up the process of keeping customers' hybrid clouds safe, Elastic announces an alerting framework, Bridgecrew automates cloud security in VS Code, Going Passwordless with YubiKey and Microsoft Azure AD, The Free ImmuniWeb Community Edition, GreatHorn vs Proofpoint: A 3rd Party Comparison, CyberArk's New Identity Security Offerings and more! Show Notes: https://securityweekly.com/esw218 Visit https://securityweekly.com/extrahop to learn more about them! Press release: https://risk.lexisnexis.com/about-us/press-room/press-release/20200223-biannual-cybercrime-report The LexisNexis Risk Solutions Cybercrime Report: https://risk.lexisnexis.com/insights-resources/research/cybercrime-report Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, In the first segment, Matt Cauthorn & Sri Sundaralingam from ExtraHop join us to discuss why Traditional IDS is Dead! Kimberly Sutherland from LexisNexis Risk Solutions will discuss The New Cybercrime Landscape! In the Enterprise Security News Thycotic and Centrify join forces, Netwrix acquires Strongpoint, SentinelOne plans for IPO, Qomplx plans to go public, and funding announcements from Axonius, HYAS, Armorblox and platform9. Attivo Networks Announces Continuous Assessment and Enforcement for AD, cPacket Networks announces cCloud, a network packet capture and analytics for Azure, Cavirin speeds up the process of keeping customers' hybrid clouds safe, Elastic announces an alerting framework, Bridgecrew automates cloud security in VS Code, Going Passwordless with YubiKey and Microsoft Azure AD, The Free ImmuniWeb Community Edition, GreatHorn vs Proofpoint: A 3rd Party Comparison, CyberArk's New Identity Security Offerings and more! Show Notes: https://securityweekly.com/esw218 Visit https://securityweekly.com/extrahop to learn more about them! Press release: https://risk.lexisnexis.com/about-us/press-room/press-release/20200223-biannual-cybercrime-report The LexisNexis Risk Solutions Cybercrime Report: https://risk.lexisnexis.com/insights-resources/research/cybercrime-report Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, In the Enterprise Security News Thycotic and Centrify join forces, Netwrix acquires Strongpoint, SentinelOne plans for IPO, Qomplx plans to go public, and funding announcements from Axonius, HYAS, Armorblox and platform9. Attivo Networks Announces Continuous Assessment and Enforcement for AD, cPacket Networks announces cCloud, and more! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw218
This week, In the Enterprise Security News Thycotic and Centrify join forces, Netwrix acquires Strongpoint, SentinelOne plans for IPO, Qomplx plans to go public, and funding announcements from Axonius, HYAS, Armorblox and platform9. Attivo Networks Announces Continuous Assessment and Enforcement for AD, cPacket Networks announces cCloud, and more! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw218
Sales Game Changers | Tip-Filled Conversations with Sales Leaders About Their Successful Careers
Read the complete transcript on the Sales Game Changers Podcast website. BILL'S TIP TO EMERGING SALES LEADERS: "You can't focus 18 hours of your day on work. You really need to take time out and spend time with your family and friends and really balance that. If you don't balance your life, it will lead to a terrible outcome. As a sales professional, as you drive into another next sales goal and continue building a big pipeline, please remember to stay close to your partners, your customers and your family and friends."
Jim and Jeff talk with Paul Volosen from Centrify about the IAM concepts used to secure server access. Brought to you by identropy.com Want to join the conversation? Leave us a message here: anchor.fm/identity-at-the-center/message or email us at questions@identityatthecenter.com. --- Send in a voice message: https://anchor.fm/identity-at-the-center/message
MONEY FM 89.3 - Prime Time with Howie Lim, Bernard Lim & Finance Presenter JP Ong
The Data Protection Excellence Centre reported that fines for PDPA breaches for organisations has hit an all-time high in Singapore. The leading cause of these breaches is compromised personal data which were leaked, with 80% of organisations found in breach between 2016 and 2019 due to negligence. Dan Mountstephen, Regional Vice President of Centrify joins us with his insights.
Tom Kemp shares his thoughts on start-up lessons learned, entrepreneurship, innovation, and tips for leaders to be more impactful in this episode.
This week, Thoma Bravo to buy majority stake in cybersecurity firm Centrify, SolarWinds acquires real-time threat-monitoring service Trusted Metrics, Mimecast acquires Ataata, AT&T to acquire AlienVault, and more on this episode of Enterprise Security Weekly! Full Show Notes: https://wiki.securityweekly.com/ES_Episode98 Visit http://securityweekly.com/esw for all the latest episodes!
This week, Thoma Bravo to buy majority stake in cybersecurity firm Centrify, SolarWinds acquires real-time threat-monitoring service Trusted Metrics, Mimecast acquires Ataata, AT&T to acquire AlienVault, and more on this episode of Enterprise Security Weekly! Full Show Notes: https://wiki.securityweekly.com/ES_Episode98 Visit http://securityweekly.com/esw for all the latest episodes!
Moen chats with us about "U by Moen", which are smart home technologies for the shower.Centrify: the cybersecurity experts talk about its “zero trust” platform.Pela is our guest, to talk about biodegradable smartphone cases.Combat “fake news” with the free Ground app for iOS and Android devices.
ITSPmagazine’s John Dasher chats with Andy Smith from Centrify during RSA Conference 2018 in San Francisco to discuss how to enable enterprises to leverage and secure user identity across their on-prem and cloud infrastructure, applying machine learning to spot and act upon unwanted and insecure activity. For more updates from RSA Conference 2018, visit https://www.itspmagazine.com/itsp-chronicles/rsa-conference-2018-recap
On this episode of CyberChat, host Sean Kelley, former chief information security officer at the Environmental Protection agency, is joined by Greg Cranley, vice president of Federal and U.S. Public Sector Sales at Centrify.
The Top Entrepreneurs in Money, Marketing, Business and Life
Tom Kemp is co-founder and chief executive officer at Centrify. Under his leadership, the company has become one of the fastest growing security vendors in the industry with over 5,000 customers, including more than half of the Fortune 50. Prior to Centrify, Kemp held various executive, technical and marketing roles at NetIQ Corporation, Compuware Corporation, EcoSystems Software, and Oracle Corporation. Mr. Kemp was also an Entrepreneur in Residence at leading venture capital firm Mayfield. He holds a Bachelor of Science degree in Computer Science and History from the University of Michigan.
It's just an interesting distraction when SONY pictures gets hacked, it may even have some entertainment value to know that the public can now read emails from executives and we can get a look at some provocative photos of a Hollywood star. Some will even hale hackers as hero's.However, it gets a little more personal when in 2013 Yahoo faces cyber attack. The attack compromised the real names, email addresses, dates of birth and telephone numbers of 500 million users. The breaches knocked an estimated $350 million off Yahoo’s sale price. 2013 it was Target stores: Credit/debit card information and/or contact information of up to 110 million people compromised. The company recently estimated the cost of the breach at $162 million2014 JP Morgan Chase The largest bank in the nation had a hack that compromised the data of more than half of all US households – 76 million – plus 7 million small businesses. In 2017 when more than 500 Million Account Details Stolen from the company we should be able to trust: Equifax it becomes very personal. Other major places to be hacked: The FBI, Home Depot AdobeUS Office of Personnel ManagementStanford UniLinkedIn2009 US MilitaryThe question becomes is anywhere safe?Our guest today is Tom KempTom Kemp is the guy who can show us the real costs and implications of not having enough, or even the right kind of cyber security.He is the co-founder and CEO at Centrify. Under his leadership, the company has become one of the fastest growing security vendors in the industry with over 5,000 customers, including more than half of the Fortune 50.Prior to Centrify, Kemp held various executive, technical and marketing roles at NetIQ Corporation, Compuware Corporation, EcoSystems Software, and Oracle Corporation. Mr. Kemp was also an Entrepreneur in Residence at leading venture capital firm Mayfield. He holds a Bachelor of Science degree in Computer Science and History from the University of Michigan.To find out more about Tom Kemp and his organization: http://Centrify.comMore on hiring the host Dov Baron: http://FullMontyLeadership.com See acast.com/privacy for privacy and opt-out information.
Being an entrepreneur is no cake walk. There will be times when you need to pick yourself up, dust yourself off, and keep on walking. Astronaut, emergency trauma doctor, father, inventor, and professional thrill-seeker, Dr. Scott Parazynski, has been through a lot and has come out on top, the top of Mt. Everest that is! The good doctor offers a motivating message on thriving in the face of adversity. In the second half of the hour, we hear from CEO and Co-Founder of Centrify, Tom Kemp, regarding recent security breaches, cyber-attacks, and the significant need for stronger password protection. How safe is your company from a breach? Find out now. [00:00:00] Parazynski Shoots for the Stars, Literally [00:06:18] Space Doctor, Trail Blazer, and Dad – Oh My! [00:12:30] Fluidity Technologies: Life Inventions [00:19:51] Overcome Adversity to Achieve Success [00:30:02] WannaCry Ransomware Cyberattack [00:35:52] Shore Up Cyber Security with Simple Tips
This week's episode of Monday Morning Radio is ripped from this month's business headlines. It will be of special interest to listeners who own or operate online businesses. Our guest is Tom Kemp, CEO and co-founder of Centrify, one of the fastest growing security vendors in the industry, serving more than 5,000 customers, including a majority of the Fortune 50. Initially, our plan was to speak Tom about data breaches - such as those that hit Yahoo and Target. These much-publicized cyber attacks are becoming more frequent, more costly, and more widespread among all online businesses - big and small. Then the WannaCry ransomware attack hit, impacting hundreds of thousands of the world’s computers in more than 150 countries. The malware forced some businesses to close while their IT people scrambled to find solutions. So we expanded the scope of our interview with Tom Kemp to include data breaches and ransomware. - They are, after all, cyber attack first cousins. Centrify recently commissioned an independent study, conducted by the Ponemon Institute, to gauge the impact of data breaches on companies and their customers. The study is unique in that it incorporates the view of three diverse groups: IT experts; senior level marketing and corporate communication professionals; and consumers. What Centrify discovered are insights that every CEO and business owner should be aware of: Cyber attacks are never confined to your IT staff. They impact every aspect of your company, including sales, marketing, finances - and for publicly held companies - shareholder value. Whether you work at an Inc. 5000 company, a Fortune 50 company, or simply a business that does business with these companies, you need to know how to protect yourself from data breaches and other cyber attacks sure to make you - and your customers - wanna cry.
The Total Tutor Neil Haley will interview Tom Kemp, Centrify CEO. About Tom Kemp: Tom Kemp is co-founder and CEO at Centrify. Under his leadership, the company has become one of the fastest growing security vendors in the industry with over 5,000 customers, including more than half of the Fortune 50. Prior to Centrify, Kemp held various executive, technical and marketing roles at NetIQ Corporation, Compuware Corporation, EcoSystems Software, and Oracle Corporation. Mr. Kemp was also an Entrepreneur in Residence at leading venture capital firm Mayfield. He holds a Bachelor of Science degree in Computer Science and History from the University of Michigan. Centrify redefines security from a legacy static perimeter-based approach to protecting millions of scattered connections in a boundaryless hybrid enterprise. As the only industry-recognized leader in both Privileged Identity Management and Identity-as-a-Service, Centrify provides a single platform to secure each user's access to apps and infrastructure through the power of identity services. This is Next Dimension Security in the Age of Access. Centrify is enabling over 5,000 customers, including over half the Fortune 50, to defend their organizations. The Ponemon study surveyed 448 individuals in IT operations and information security, 334 senior level marketing professionals and 549 consumers. The Security Effectiveness Score (SES) is determined by utilizing the Ponemon Institute's proprietary benchmark database, which consists of 2,012 separate data breach cases occurring over the past 12 years. The SES is derived from the rating of numerous security features or practices. This method has been validated from more than 50 independent studies conducted for more than a decade.
Jim Routh of Aetna and InfoSec World joins us. In the news, Cisco touts next-generation firewall gear, a new decryption tool from Avast, Centrify stops breaches in real time, and more. Stay tuned!
Cisco touts next-generation firewall gear, a new decryption tool from Avast, Centrify stops breaches in real time, and more in this week’s Enterprise News! Full Show Notes: http://wiki.securityweekly.com/wiki/index.php/ES_Episode34 Visit http://securityweekly.com/esw for all the latest episodes!
Cisco touts next-generation firewall gear, a new decryption tool from Avast, Centrify stops breaches in real time, and more in this week’s Enterprise News! Full Show Notes: http://wiki.securityweekly.com/wiki/index.php/ES_Episode34 Visit http://securityweekly.com/esw for all the latest episodes!
Jim Routh of Aetna and InfoSec World joins us. In the news, Cisco touts next-generation firewall gear, a new decryption tool from Avast, Centrify stops breaches in real time, and more. Stay tuned!
Despite years of discussion on the importance of identity management, the majority of organizations still grapple with this basic component of cyber hygiene and fail to adequately secure user credentials. ICIT Sr. Fellow Parham Eftekhari speaks with Greg Cranely from Centrify (an ICIT Fellow) on the challenges facing the public and private sector and how multi-factor authentication and cutting edge credential management tools can improve the resiliency of an organization.
Crypto wars updates. Iran vs. US in cyberspace. Big Angler malvertising campaign. CyberWire editor John Petrik joins us to discuss the expected indictment of Iranian hackers by the US government. Chris Webber from Centrify shares tips for multi-factor authentication.