POPULARITY
Ed Amoroso is the CEO of TAG Infosphere. Previously, Ed served as the CSO at AT&T. (3:22) - Innovation & Ed's time at Bell Labs (6:50) - AI in Large Enterprise (8:53) - Managing AI Risk in Large Enterprise (16:36) - the CISO Role & SEC Regulations (23:58) - Future of Cybersecurity & Government Involvement (32:00) - Rapid Fire & Wrap Up
Peggy Smedley and Ed Amoroso, CEO, TAG Infosphere, talk about the challenges cybersecurity presents and the role the board of directors plays. He explains his experience on both sides—on a board of directors for a Fortune 500 bank and as a chief information security officer. They also discuss: That board of directors don't typically have experience in cyber. What companies should do if there is a cyberattack. How ESG is strategic and about optimizing your business. tag-cyber.com (11/7/23 - 846) IoT, Internet of Things, Peggy Smedley, artificial intelligence, machine learning, big data, digital transformation, cybersecurity, blockchain, 5G, cloud, sustainability, future of work, podcast, Ed Amoroso, TAG Infosphere, worker of tomorrow This episode is available on all major streaming platforms. If you enjoyed this segment, please consider leaving a review on Apple Podcasts.
Peggy Smedley and Ed Amoroso, CEO, TAG Infosphere, talk about the challenges cybersecurity presents and the role the board of directors plays. He explains his experience on both sides—on a board of directors for a Fortune 500 bank and as a chief information security officer. They also discuss: That board of directors don't typically have experience in cyber. What companies should do if there is a cyberattack. How ESG is strategic and about optimizing your business. tag-cyber.com (11/7/23 - 846) IoT, Internet of Things, Peggy Smedley, artificial intelligence, machine learning, big data, digital transformation, cybersecurity, blockchain, 5G, cloud, sustainability, future of work, podcast, Ed Amoroso, TAG Infosphere, worker of tomorrow This episode is available on all major streaming platforms. If you enjoyed this segment, please consider leaving a review on Apple Podcasts.
0:00 -- Intro.1:35 -- Start of interview.2:15 -- Bethany's "origin story".3:35 -- Her experience working at Lockheed Martin.5:55-- Her transition to Apple Computer, Cisco, startups in networking technologies and Blue Coat.8:17 -- Her time at HP, where ended running the Networking division.8:55 -- Her role as CEO of Ixia (later sold to Keysight Technologies for $1.6bn in 2017)10:17 -- On her board journey. Her first public company experience with Ixia, under the mentorship of Chairman Errol Ginsberg.11:07 -- Her experience serving on the board of Sempra Energy and as an Executive Advisor with Siris Capital (a PE firm). Her board positions with Box, Marvell Semiconductor and Lam Research.13:38 -- On her decision to complete a Masters Program in Cybersecurity Risk and Strategy from NYU: "to be a good board member in this area [in addition to technical issues] you need to understand issues related to technology, law, regulation and governance."17:09 -- The current cybersecurity landscape from the board's perspective. "Over the last ~10+ years, the incidence, frequency, sophistication and damage of cybersecurity breaches has continued to significantly escalate." "For companies, it has been very costly (examples: Equifax, Target, Home Depot, Colonial Pipelines, Solar Winds, etc.)" "The attacks will continue and they are getting easier to do, ie. ransonware as-service-attack." "This is only going to get worse." "Nation states are also involved, and it's very hard to keep up."21:15 -- Where does cybersecurity fit in board committees? Audit committees vs special cybersecurity committees and full board discussions.25:05 -- On cybersecurity experts on boards. "It's important to have someone on your board who has a reasonable technical understanding of what the CISO and/or CIO is talking about re cybersecurity (ability to translate technical discussion to board level discussion.)" It's different to raw technology expertise. "Why wouldn't you have someone in the room with cybersecurity expertise (when the cybersecurity risk is so high)?"28:39 -- On cybersecurity challenges going forward. 1) Nation-state risks (ie Russia, China, North Korea, Iran), 2) AI risks (ie. using certain automated AI-based coding could insert malicious code into software source-code).34:30 -- On staying updated on the latest cybersecurity threats. Recommended experts: Bob Zukis from the Digital Directors Network (he was guest speaker on my E81 of the Boardroom Governance Podcast) and Ed Amoroso with Tag Cyber / NYU. You should also pay attention to the Cybersecurity & Infrastructure Security Agency (CISA). *Other sources:The Cipher BriefCyber Initiatives GroupHarvard Business Review ("a lot of good articles on cyber governance")The Cyberwire37:41 -- On the enhanced duties of directors in the market downcycle. "Innovation will continue despite the economic crisis." "The pendulum swings back and forth, and there will be a recovery."42:28 -- On the increasing geopolitical risks with China and how boards should approach this "decoupling" or "de-risking". "As a board member, this is a risk issue and it has to be managed and mitigated."47:56 -- The books that have greatly influenced her life: A Tree Grows in Brooklyn, by Betty Smith (1943)Let My People Go Surfing, by Yvon Chouinard (2006)The Outsiders, by William N. Thorndike Jr. (2012)51:04 -- Her mentors, and what she learned from them. Her FatherJudy Estrin (a networking technology pioneer and Silicon Valley leader)54:55 -- Quotes she thinks of often or lives his life by: "The best way out is always through." (Robert Frost)56:20 -- An unusual habit or an absurd thing that she loves: Bird watching (influenced by her husband).58:14 -- The person she most admires: Ruth Bader Ginsburg.Bethany Mayer is a Silicon Valley-based corporate director with 30 years of experience in general management, marketing, product development and operations. She previously held executive roles at HP, Cisco, Blue Coat, Apple, and start-ups. Bethany has served on several public and private company boards, including at Ixia, Pulse Secure and Marvell Semiconductor. She currently serves as the Chair of the Board of Box, and is a director at Sempra Energy, Ambri and Lam Research.__ You can follow Evan on social media at:Twitter: @evanepsteinLinkedIn: https://www.linkedin.com/in/epsteinevan/ Substack: https://evanepstein.substack.com/__Music/Soundtrack (found via Free Music Archive): Seeing The Future by Dexter Britain is licensed under a Attribution-Noncommercial-Share Alike 3.0 United States License
Edward Amoroso is the founder and CEO of Tag InfoSphere. He also teaches courses on cybersecurity at NYU and the Stevens Institute of Technology. Previously, he was the CISO of AT&T for many years. Tag Cyber: https://www.tag-cyber.com Cybrary: https://www.cybrary.it SANS: https://www.sans.org Coursera: https://www.coursera.org Edward Amoroso LinkedIn: https://www.linkedin.com/in/edward-amoroso/
Since the beginnings of computer networking technology, inventing new and better ways to secure networks has been vital to their use in the marketplace. From government applications to commercial, network security has been essential to protect these entities from lost or stolen data, networks being held hostage, etc. In today's landscape, attacks are nearly an inevitability and even more so than in decades past.So, knowing how important it is to the functions of our society, what's next for network security? Who better to ask than the expert who's helped define the space since 1985? In this podcast, we speak with Ed Amoroso, CEO of TAG Cyber, a company that provides cybersecurity research and advisory “as a service.”To learn more about managed network security services, visit:https://www.highwirenetworks.com/services/managed-cybersecurity/To learn more about our Overwatch Cybersecurity Partner Program and how to become a security solutions provider, visit:https://www.highwirenetworks.com/cybersecurity-partners/
In this episode, host Bidemi Ologunde had an insightful and inspiring conversation with Peter Galanis, a distinguished mentor, leader, and friend. The conversation started with Pete giving a summary of his vast experience and background in the tech/cyber industry, from the days of working the Russian desk as a Signals Intelligence Analyst to his time at AT&T and, subsequently, Verizon.The conversation then moved to how and why the IT industry seems to be as static as it is dynamic; the need to return to fundamental principles of securing systems and networks; whether old-school networking protocols are still relevant in today's gradual and inevitable shift towards Web3.0; some thoughts about smart contracts, fraud, and implicit trust systems; the distinctions between physical vs. cyber threats within organizations and across multiple industries; the concept of self-sovereign identity and self-sovereign data; how organizations can effectively manage their vast data footprint; and lots more. Pete made an insightful 2-3 year prediction regarding how to effectively manage and secure vast amounts of data for average end users when data saturation becomes prevalent and inevitable at the individual user level.We had a very insightful conversation, with Pete sharing so much of his abundant knowledge during this relatively short hour-long episode. There were some important shoutouts during the episode as well: shoutout to Roy Eggensperger (it was great meeting up in Vegas during DEFCON), and also Ed Amoroso, Pete's long-time friend, who I first met when Pete invited him to an all-hands call when I was still working at Verizon.Check out host Bidemi Ologunde's other creative outlets on LinkTree.Buzzsprout - Let's get your podcast launched! Start for FREEDisclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.Support the show
With diplomacy at a stand and Russian troops now openly in Ukraine, Western governments impose sanctions on Russia. A fresh round of distributed denial-of-service attacks against Ukraine. Cobalt Strike continues to be misused by criminals. A cyberattack has severely disrupted a major logistics firm. My conversation with Assistant Director Bryan Vorndran of the FBI Cyber Division. Our guest Ed Amoroso from TAG Cyber explains Research as a Service. And two looks at the recent and prospective state of industrial cybersecurity. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/11/36
All links and images for this episode can be found on CISO Series You're a security vendor and you've got a short briefing with a security analyst from a research firm. What do you want to get across to them, and what do you want to hear back from them? Check out this post for the discussion that is the basis of our conversation on this week's episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap), CISO, LinkedIn. Our guest is Ed Amoroso (@hashtag_cyber), founder and CEO, Tag Cyber. Huge thanks to our sponsor, Cymulate The Ultimate Guide to Security Posture Validation: Learn how to effectively measure and reduce risk through continuous validation of your enterprise's security posture. Download the playbook here. In this episode: What are the right questions to ask? How can we better understand each other? What to NOT do in an analyst conversation
Chief Executive Officer and Founder of TAG Cyber, Ed Amoroso, shares how he learned on the job and grew his career. In his words, Ed "went from my dad having an ARPANET connection and I'm learning Pascal, to Bell Labs, to CISO, to business, to quitting, to starting something new. And now I'm riding a new exponential up and it's a hell of a ride." Hear from Ed how he sees security as a side dish that you'll progress into naturally once you've paid your dues and mastered a skill like networking, software or databases. We thank Ed for sharing his story with us.
Chief Executive Officer and Founder of TAG Cyber, Ed Amoroso, shares how he learned on the job and grew his career. In his words, Ed "went from my dad having an ARPANET connection and I'm learning Pascal, to Bell Labs, to CISO, to business, to quitting, to starting something new. And now I'm riding a new exponential up and it's a hell of a ride." Hear from Ed how he sees security as a side dish that you'll progress into naturally once you've paid your dues and mastered a skill like networking, software or databases. We thank Ed for sharing his story with us.
Too lucrative, too easy, and not enough investment. In the simplest terms possible, that is how you could describe the current state of cybersecurity. Over the last month, we've heard from some of the top minds in the industry, and a general consensus is that despite the innovations and optimism in the world of cybersecurity, those three issues remain at the heart of the problem. “There's more tools available. There is more research. The hacking communities are actually businesses. They employ people, they pay people and they ride these things and it is becoming easier. The overall system has not been very well-studied to understand what are the right things to do and what things we should limit and that kind of thing.”That's Taher Elgamal, CTO for Security at Salesforce and on this episode of IT Visionaries, our cybersecurity series concludes as Taher is joined by Ed Amoroso, Founder and CEO of TAG Cyber. The two discuss the state of cybersecurity, including where companies are getting their security measures right, and where the industry is struggling as a whole. The two also detail why the growing divide in skills is a problem without an immediate solution, and why financial incentives are simultaneously the biggest opportunity to stop attacks and the biggest threat to escalating attacks.Main TakeawaysCyber Know How: Today it's easy to simply buy a product or service and bolt that service on top of your current tech stack. But one of the biggest problems most enterprises are running into is a lack of knowledge in how to actually operate those services efficiently and effectively.Test, Then Test Again: Securing a network is not a one-time fix, it requires companies to be continually testing their networks for vulnerability. A good practice is to place a heavy emphasis on hiring white hat employees, or other hacker services whose sole responsibility is to attempt to break your network. When you are continually testing, it's much easier to understand where your weaknesses are and then design products to patch those weaknesses. Can't We All Get Along?: There are more cybersecurity applications than ever before, but even with the growing number of available vendors, attacks are increasing. Until cyber threats begin to dwindle yearly, a good solution would be for companies to start sharing assets and information in order to help build more securable and unbreakable products.IT Visionaries is brought to you by the Salesforce Platform - the #1 cloud platform for digital transformation of every experience. Build connected experiences, empower every employee, and deliver continuous innovation - with the customer at the center of everything you do. Learn more at salesforce.com/platform
A lot can be done by CSOs/CISOs to maximize value and reduce risks when working with PR/media. However, the path forward is not always straightforward. What are the common hiccups, screw-ups, and give-ups?As part of our ongoing "CISO functional relationships" series, in today's episode, we look at the role of PR and the media as a function of establishing and maintaining trust internally with the executives, the board, the partners, and externally with the customers and the public.There's an old saying, "There is no such thing as bad press. All press is good press," but that is precisely an "old" saying. Nowadays, branding and reputation matter, which is even more true in information security. The impact of a breach on the company's reputation and bottom line can cause some severe damage, but the story is more complex than that. Nowadays, there is an entire system that needs to change to manage reputation in the right way. The conversation with the media and the public can be more positive, constructive, and transparent.In this podcast, we talk about this and much more.GuestsMelanie Ensign, Founder & CEO, Discernible (@iMeluny on Twitter)Ed Amoroso, Founder and CEO of TAG Cyber (@hashtag_cyber on Twitter)This Episode's SponsorsHITRUST: https://itspm.ag/itsphitwebSemperis: https://itspm.ag/semperis-1rooResourcesMedium Post by Melanie: https://medium.com/discernible/security-privacy-incident-hiccups-f-ck-ups-and-give-ups-e972ef46c3dTo see and hear more Redefining Security content on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-securityAre you interested in sponsoring an ITSPmagazine Channel?https://www.itspmagazine.com/podcast-series-sponsorships
A lot can be done by CSOs/CISOs to maximize value and reduce risks when working with PR/media. However, the path forward is not always straightforward. What are the common hiccups, screw-ups, and give-ups?As part of our ongoing "CISO functional relationships" series, in today's episode, we look at the role of PR and the media as a function of establishing and maintaining trust internally with the executives, the board, the partners, and externally with the customers and the public.There's an old saying, "There is no such thing as bad press. All press is good press," but that is precisely an "old" saying. Nowadays, branding and reputation matter, which is even more true in information security. The impact of a breach on the company's reputation and bottom line can cause some severe damage, but the story is more complex than that. Nowadays, there is an entire system that needs to change to manage reputation in the right way. The conversation with the media and the public can be more positive, constructive, and transparent.In this podcast, we talk about this and much more.GuestsMelanie Ensign, Founder & CEO, Discernible (@iMeluny on Twitter)Ed Amoroso, Founder and CEO of TAG Cyber (@hashtag_cyber on Twitter)This Episode's SponsorsHITRUST: https://itspm.ag/itsphitwebSemperis: https://itspm.ag/semperis-1roo____________________________ResourcesMedium Post by Melanie: https://medium.com/discernible/security-privacy-incident-hiccups-f-ck-ups-and-give-ups-e972ef46c3d____________________________To see and hear more podcasts and webcasts about Redefining CyberSecurity for your business, tune in to ITSPmagazine at:https://www.itspmagazine.com/redefining-cybersecurityAre you interested in advertising on ITSPmagazine?
Ed Amoroso of Tag Cyber, former CSO of AT&T talks about the IT perspective & approach for OT security - where to start and what to watch for.
Ed Amoroso of Tag Cyber, former CSO of AT&T talks about the IT perspective & approach for OT security - where to start and what to watch for.
During this segment, Dr. Shawn Murray speaks with Ed Amoroso, founder of TAG Cyber and former CISO of AT&T. Ed explains the history and evolution of information security, technology, and the need to bridge gaps between practitioners and academia. Ed’s contribution in both areas has allowed him to transition to his role at TAG Cyber when he and his teamwork to help various businesses understand where they can best allocate specific resources and debunks many mindsets on generally accepted best practices in information and cybersecurity. Shawn and Ed discuss some of Ed’s additional contributions in academia as well.
Ed Amoroso spent over 30 years with AT&T and was frustrated with the security research and advisory firms. We all have our stories, but Ed decided to do something about it. He created TAG Cyber to democratize world-class cyber security research and advisory services. Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/bsw185
This week, we welcome Ed Amoroso, CEO at TAG Cyber, to discuss Disrupting Traditional Security Research & Advisory! In the Leadership and Communications section, Why Do Your Employees Resist New Tech?, Who’s Responsible for a Safer Cloud?, Publicly Reported Data Breaches Stand at its Lowest Point in 5 Years, and more! Show Notes: https://wiki.securityweekly.com/bsw185 Visit https://www.securityweekly.com/bsw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
Ed Amoroso spent over 30 years with AT&T and was frustrated with the security research and advisory firms. We all have our stories, but Ed decided to do something about it. He created TAG Cyber to democratize world-class cyber security research and advisory services. Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/bsw185
This week, we welcome Ed Amoroso, CEO at TAG Cyber, to discuss Disrupting Traditional Security Research & Advisory! In the Leadership and Communications section, Why Do Your Employees Resist New Tech?, Who’s Responsible for a Safer Cloud?, Publicly Reported Data Breaches Stand at its Lowest Point in 5 Years, and more! Show Notes: https://wiki.securityweekly.com/bsw185 Visit https://www.securityweekly.com/bsw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
COVID-19 Contact Tracing Apps was originally held on May 1, 2020 to discuss the privacy implications of technology-based contract tracing applications. The event was co-hosted by Marc Canellas and Rights Over Tech, the Engelberg Center, the Information Law Institute, and the NYU Center for Cybersecurity. The discussion features:-- Rachel Levinson-Waldman, Senior Counsel, Liberty and National Security, NYU Brennan Center for Justice (Moderator).-- Lorna Thorpe, Professor of Epidemiology, Director of the Division of Epidemiology, NYU Langone School of Medicine.-- Philip Alston, John Norton Pomeroy Professor of Law, NYU School of Law; UN Special Rapporteur on extreme poverty and human rights.-- Ed Amoroso, Distinguished Research Professor, NYU Tandon School of Engineering; CEO, TAG Cyber LLC.
Ed and Sam discuss Ed’s journey into security, his beginning at Bell Lads, and the experiences that shaped his understanding of socializing, and the value of soft skills for a CISO. The post Ed Amoroso – Founder and CEO at TAG Cyber appeared first on Malicious Life.
In this episode I'm both thrilled and honored to have Ed Amoroso, the Founder and CEO of TAG-Cyber and past CISO and SVP at AT&T as my guest. Ed talks about the beauty of cloud and why he believes the trends back to centralization of IT (cloud) and security is a good thing. As Ed so eloquently says, "...who is going to build a data center...Earl in Networking or Microsoft? You can find Ed at www.TAG-Cyberf.com or check out his new eBook called "Working from Home: A Guide to Navigating the New Normal," you can buy it today on Amazon at https://lnkd.in/dnHRFkK
COVID-19 is having a dramatic impact on the nature of market, credit, financial, and operational risks facing companies. Information about these risks is evolving at a rapid pace. To help risk managers stay informed of the latest developments and address the challenges associated with COVID-19, GARP has launched a podcast series featuring lively discussions with thought leaders and experts. Our first interview is with Ed Amoroso, currently Chief Executive Officer of TAG Cyber LLC, a global cyber security advisory, training, consulting, and media services company supporting hundreds of companies across the world. Ed recently retired from AT&T after thirty-one years of service in the cybersecurity space. In recent years, financial institutions have proven to be vulnerable to cyberattacks, leaving risk teams scrambling. With more work pushed online than ever before due to COVID-19 – and hackers finding new ways to exploit networks - understanding new and evolving cyber risks is even more critical today. How can cyber risk and risk management in general keep up with the sophistication and scale of potential attacks against company systems in a work environment that has already been disrupted? What role do CROs and risk managers play in this battle and what role do cybersecurity professionals play in risk management in the future. To access our full library of COVID-19 content click here. Dr. Ed Amoroso is currently Chief Executive Officer of TAG Cyber LLC, a global cyber security advisory, training, consulting, and media services company supporting hundreds of companies across the world. Ed recently retired from AT&T after thirty-one years of service, beginning in Unix security R&D at Bell Labs and culminating as Senior Vice President and Chief Security Officer of AT&T from 2004 to 2016. Ed has been Adjunct Professor of Computer Science at the Stevens Institute of Technology for the past twenty-seven years, where he has introduced nearly two thousand graduate students to the topic of information security. He is also affiliated with the Tandon School of Engineering at NYU as a Research Professor, and the Applied Physics Laboratory at Johns Hopkins University as a senior advisor. He is author of six books on cyber security and dozens of major research and technical papers and articles in peer-reviewed and major publications. Ed holds the BS degree in physics from Dickinson College, the MS/PhD degrees in Computer Science from the Stevens Institute of Technology, and is a graduate of the Columbia Business School. He holds ten patents in the area of cyber security and media technology and he has served as a Member of the Board of Directors for M&T Bank, as well as on the NSA Advisory Board (NSAAB). Ed’s work has been highlighted on CNN, the New York Times, and the Wall Street Journal. He has worked directly with four Presidential administrations on issues related to national security, critical infrastructure protection, and cyber policy.
In This episode of The Cybrary Podcast we are happy to welcome Cybrarys new Advisory Board. The members include Chris Kubecka the CEO of HypaSec, Chris Hodson the CISO of Tanium, Vishal Gupta the Global CTO and SVP of Unisys, and Ed Amoroso the CEO of Tag Cyber. It was hard to contain all this knowledge in one show but we are glad to have them on the Cybrary Team!
When it comes to security, we're living in interesting times. Nation states are playing roles we've never seen before, or at least been privy to. And more and more large-scale ransomware attacks and breaches are taking place, while executives are losing their job because of cyber security issues. In this episode, Jon Prial talks with Ed Amoroso, AT&T's former chief security officer and a true leader in the field of cyber security. Find out about the challenges of security in the digital age and how to become a security first business. Learn more by checking out: https://www.tag-cyber.com/Annual/2017/ https://georgianpartners.com/security-first/
Brian Contos chats with Ed Amoroso, former SVP and CSO of AT&T and current CEO of TAG Cyber LLC, about priorities and advice for building a top-notch security team. From Ed’s perspective, decision-making board members must be equipped with continuous data and have instincts that come from experience, but that can be a challenging balance to find.
Brian Contos chats with Ed Amoroso, former SVP and CSO of AT&T and current CEO of TAG Cyber LLC, about priorities and advice for building a top-notch security team. From Ed's perspective, decision-making board members must be equipped with continuous data and have instincts that come from experience, but that can be a challenging balance to find.
Security is a high-priority functional requirement at every stage of the unified communications product development lifecycle. What are some of the specific issues related to cybersecurity that teams in the UC ecosystem must prioritize upon? What should be the best approach towards securing critical UC infrastructure, systems and services fundamental to nation states? Join us as Ed Amoroso, former chief security officer of AT&T provides his insights into how together with a robust foolproof security architecture, building cryptographic identities into hardware would be the way forward in overcoming the security challenges we face today. Learn more: http://cs.co/9001DZhbc
What’s the good, the bad and the future of the increasingly close relationship between technology and security? Find out as Ben Jun, CEO, HVF Labs, and Ed Amoroso, CEO, TAG Cyber, share the latest insights into the technology development process.