POPULARITY
In this episode of B2B Marketing: The Provocative Truth, Benedict sits down with Jennifer Leggio to discuss how attribution for marketing and sales needs to change with the buyer journey.Nowadays, it's extremely important for sales and marketing to work together to achieve the same goal of creating pipeline. However, it would seem many B2B businesses are functioning as if marketing and sales can be accurately measured with the same KPIs. Using the same metrics for marketing as sales will undoubtedly create incomplete or inaccurate data on how marketing contributes to pipeline. Additionally, with how fast the world changes, it's more important than ever to reevaluate how marketing and sales can tackle the buyer journey and what metrics to judge them by. So what needs to change?Jennifer Leggio is CMO of Netography, and she has been an innovative and tenacious B2B marketer for 23+ years. Her career has focused primarily on the cybersecurity industry, and she has significant experience in communications and growth strategy. Prior to joining Netography in 2022, Jennifer has held several senior marketing positions including as CMO & VP Revenue Operations at Virsec, CMO of Claroty, CMO & VP Operations at Flashpoint, and more. She has also served as an Advisor for MetroSITE Group, LLC, Infocyte, Inc., Glasswing Ventures, and more.You can find Jennifer Leggio on Linkedin.You can watch full video versions of the podcast on our YouTube channel.Ready to provoke the truth? Get in touch at alan-agency.com. Hosted on Acast. See acast.com/privacy for more information.
Rohit Dhamankar from Fortra's Alert Logic sits down with Dave Bittner to share his experiences as he navigates the industry. Rohit has over 15 years of security industry experience across product strategy, threat research, product management and development, and customer solutions. Before Alert Logic he served in Product roles for Live Oak Venture Capital at Infocyte and Razberi Technologies. He has previously worked in senior roles in several start-up companies in security analytics, intrusion detection/prevention, end-point protection, and security risk and compliance, including VP, Click Labs Solutions at Click Security, acquired by AlertLogic, and he was a Co-Founder of Jumpshot, acquired by Avast. Rohit shares the advise of never closing a door too prematurely, because you never know what could be behind the door waiting for you. We thank Rohit for sharing his story.
Rohit Dhamankar from Fortra's Alert Logic sits down with Dave Bittner to share his experiences as he navigates the industry. Rohit has over 15 years of security industry experience across product strategy, threat research, product management and development, and customer solutions. Before Alert Logic he served in Product roles for Live Oak Venture Capital at Infocyte and Razberi Technologies. He has previously worked in senior roles in several start-up companies in security analytics, intrusion detection/prevention, end-point protection, and security risk and compliance, including VP, Click Labs Solutions at Click Security, acquired by AlertLogic, and he was a Co-Founder of Jumpshot, acquired by Avast. Rohit shares the advise of never closing a door too prematurely, because you never know what could be behind the door waiting for you. We thank Rohit for sharing his story. Learn more about your ad choices. Visit megaphone.fm/adchoices
Nothing says old school cool quite like a Rolodex. Just ask Matt, Rich, and guest host Esteban Blanco, of Blanco I.T. But first, ask them about Datto buying EDR vendor Infocyte, the new education PCs from HP, and predictions for IT in 2022, because they have lots to say about all that and more. Then they're joined by Rex Frank, vice president of academy at Pax8, to discuss the importance of building plans for what you'll do after an exit into your exit plan, to avoid emotional and financial stress. If you're old enough to know what a Rolodex is, or maybe even own one, you need to hear this conversation. Subscribe to ChannelPro Weekly! iTunes: https://itunes.apple.com/us/podcast/channelpro-weekly-podcast/id1095568582?mt=2 Google Podcasts: https://podcasts.google.com/feed/aHR0cHM6Ly9jaGFubmVscHJvd2Vla2x5LmxpYnN5bi5jb20vcnNz?sa=X&ved=2ahUKEwjq-N3UvNHyAhVWPs0KHYdTDmkQ9sEGegQIARAF Spotify: https://open.spotify.com/show/7hWuOWbrIcwtrK6UJLSHvU Amazon Music: https://music.amazon.com/podcasts/a1d93194-a5f3-46d8-b625-abdc0ba032f1/ChannelPro-Weekly-Podcast More here: https://www.channelpronetwork.com/download/podcast/channelpro-weekly-podcast-episode-210-pockets-fun Topics and Related Links Mentioned: Register for the 2022 ChannelPro SMB Forum in Newark, NJ! Use Promo Code CPVIP - https://cvent.me/N9Mqyn Datto Buys EDR Vendor Infocyte - https://www.channelpronetwork.com/news/datto-buys-edr-vendor-infocyte HP Introduces PCs and Webcams for a New Era of Education - https://www.channelpronetwork.com/news/hp-introduces-pcs-and-webcams-new-era-education Welcome to the Year of the Predictable - https://www.channelpronetwork.com/article/welcome-year-predictable Post-Exit Exit Planning - https://www.channelpronetwork.com/article/post-exit-exit-planning The Celebrant Singers - http://www.celebrants.org/ Rich's ICYMI plug and quickie preview of the week ahead - https://www.channelpronetwork.com/tags/icymi
The Microsoft 365 environment is complex to administer from a cybersecurity perspective. There are very expensive options from Microsoft that add advanced security elements to the 365 environment. In addition to cost, ease of use and knowledge can become limiting factors dependant on the capability of the organization when implementing Microsoft's advanced security. Dark Rhino Security and Infocyte partnered to build a managed service offering that dramatically simplifies the evaluation, compilation, and remediation of security gaps present in a companies Microsoft 365 environment. Chris Auger from Infocyte and Tyler Smith, a co-founder of Dark Rhino Security, host this episode of Security Confidential and explain how to benchmark against the CIS standards a Microsoft 365 environment and how to remediate the gaps in a simplified manner. The end result is a highly secure Microsoft 365 environment. Chapter Markers 00:14 Introduction 03:10 Microsoft 365 Security Overview 04:50 Why Microsoft 365 is difficult 05:30 Why set it and forget is the wrong answer 08:00 Anatomy of an attack, attack chain 13:20 The attack vectors 15:33 Cost structure of M365 tools 20:15 Dark Rhino Security Microsoft 365 Security Assessment 23:48 Security controls analyzed as part of assessment 25:08 Value of Dark Rhino Security in the Process 26:15 Is Tenable used under the hood? 27:15 Does MFA solve the security gaps? 29:35 What is out of domain forwarding and will they block it? 32:47 Does Small Business really have the risk 42:35 Timeline for Assessments The Video for this episode can be found at https://youtu.be/KWSVZhUFM-Y To get the free vulnerability scan of up to 10,000 nodes in your network call Dark Rhino Security at 614.401.3025 or visit https://www.darkrhinosecurity.com or email info@darkrhinosecurity.com
Mind the Gap, Avoid the Prevention Paradox The more focus a company puts on prevention of cyber-attacks, paradoxically, the more unsecure it becomes. In an environment where a heavy prevention strategy is used the dwell time of attackers can be indefinite. This episode of Dark Rhino’s Security Confidential focuses on the Prevention Paradox and how to avoid it. There are three pillars of cybersecurity: prevention, detection, and response. There is a tendency, for companies, to focus extensively on prevention. In the SANS sliding scale of cybersecurity prevention is at the forefront with detection and response more to the right on the scale. Many a company following the SANS Sliding Scale end up with extensive focus on prevention for a host of reasons which are discussed. Prevention can take several forms, one of the most common being the use of endpoint protection tools like Next Generation Anti-Virus (NGAV). The advances made in these tools have been significant over the past many years with the incorporation of artificial intelligence with machine learning into their detection engines. These advanced technologies are not enough. Why? There are three levels of unknowns as one climbs the Pyramid of Pain. There are: known-knowns, unknown-knowns, and unknown-unknowns. Known-knowns are easy to deal with it. Their signatures are known and their exploits well documented. Unknown-knowns are a bit tricker but with behavior detection through machine learning in NGAV they can be handled with great effectivity. The unknown-unknowns are the most difficult to deal with and they are at the pinnacle of the pyramid of pain. They make use of novel tools, tactics, and procedures (TTPs) that are not yet within the grasp of detection through automation or pattern recognition. The uncovering of attacks based on novel TTPs is not within the domain of a vendor and requires proactive human based threat hunting. This is best evidenced in recent times by the exploitation of the Solarwinds vulnerability with Sunburst. The TTPs used were so advanced that Fireye and the US Federal Government could not detect the attack with the plethora of tools, processes, and technologies they had in place for their cyber defense. It was only detected by human intelligence. The more focus that is put on prevention the more data becomes available to attackers on the methods of prevention. They keep testing cyber defenses and are able to come up with alternative methods to by-pass those defenses. On the part of the defender, the belief is that they are well protected, and they may not readily realize their methods have been compromised and thus allow indefinite dwell times on the part of the attacker. This is the prevention paradox. The panelists, Manoj Tandon, Chris Gerritz, and Tyler Smith discuss the prevention paradox. Both Chris Gerritz and Tyler Smith are ex US Military. With Chris Gerritz spending his service time in the US Air Force. It was in the US Air Force that the term “The Prevention Paradox” was coined. It has not been extensively talked about till now. The panelists discuss much an organization can do to avoid the prevention paradox. The first thing that must be done is a distinct separation of the detect and response tools from the endpoint protection tools must be had. It is very tempting to have a single vendor for detection, response, and endpoint protection. Many organizations use one vendor for protection, detection, and response. This causes organizations to fall into the prevention paradox. Layering in the Dark Rhino Security’s Six Sigma based Iπ&r process for detection and response, which utilizes the underlying technology of Infocyte, enables rapid analytics-based hypotheses to be formed and tested rapidly across the entire network further prevention the Prevention Paradox. The Video Cast of the webinar https://youtu.be/A_3K86tKOxY Panelists: Manoj Tandon, Chris Gerritz, Tyler Smith
Welcome to our special episode of Breaking Badness. With us today is CMO extraordinaire at Flashpoint, Jennifer Leggio. Jennifer is also on the Board of Advisors for Infocyte and a portfolio advisor at GlassWing ventures.
Chris Gerritz is Chief Product Officer and Co-founder of Infocyte. Chris led the initial cadre for the standup of US Air Force 67th Cyberspace Wing's Defensive CounterCyber capability, which was the world's first enterprise-scoped Hunt Team. In this episode we discuss incident response, managed detection and response and cloud workload protection. https://www.infocyte.com/resources/mid-market-threat-and-incident-response-report/
The ever-evolving cyber threat and how to protect ourselves against It continues to be at the top of the list of priorities for most IT Pros and execs. As technology and our data is more crucial than ever to our day to day operations, the threat of disruption to it and the impact that will have grows almost exponentially. As we head into February of 2019, what is the current state of the threat? How is it evolving? And how do we build a plan to handle it? That is the topic of this week's Tech Interviews, as I'm joined by Co-Founder and CPO of Infocyte Inc. Chris Gerritz to discuss the art of Cyber Threat Hunting and taking a more proactive approach to the cybersecurity challenge. In this chat with Chris, we take a look at what we mean by cyber threat hunting, the importance of a proactive approach to cyber threats and why we should "assume breach" when we build our cybersecurity defences. We also discuss current threats, emerging trends from commodity malware to identity theft, as well as avoiding been the "weakest Gazelle in the pack". Chris shares some insights into developing a cyber threat hunting strategy and how to build a secure environment, as well as providing some background on Infocyte's approach to the challenge If you enjoyed the show, then please leave us a review and why not subscribe to ensure you get the latest Tech Interviews episode. Thanks for listening. Full show notes are here : https://wp.me/p4IvtA-1DS
In the news this week, Product announcements from Infoblox, Infocyte, ObserveIT, ThreatQuotient, Cisco and Tufin. Symantec could be in hot water, and CA and Palo Alto both made a recent acquisition, and more on this episode of Enterprise Security Weekly! Full Show Notes: https://wiki.securityweekly.com/ES_Episode87 Visit http://securityweekly.com/esw for all the latest episodes!
This week, John Strand and I interview Senior Solutions Architect at ObserveIT, Kevin Donovan! In the news this week, Product announcements from Infoblox, Infocyte, ObserveIT, ThreatQuotient, Cisco and Tufin. Symantec could be in hot water, and CA and Palo Alto both made a recent acquisition. All that and more, on this episode of Enterprise Security Weekly! Full Show Notes: https://wiki.securityweekly.com/ES_Episode87 Visit https://www.securityweekly.com/esw for all the latest episodes!
In the news this week, Product announcements from Infoblox, Infocyte, ObserveIT, ThreatQuotient, Cisco and Tufin. Symantec could be in hot water, and CA and Palo Alto both made a recent acquisition, and more on this episode of Enterprise Security Weekly! Full Show Notes: https://wiki.securityweekly.com/ES_Episode87 Visit http://securityweekly.com/esw for all the latest episodes!
This week, John Strand and I interview Senior Solutions Architect at ObserveIT, Kevin Donovan! In the news this week, Product announcements from Infoblox, Infocyte, ObserveIT, ThreatQuotient, Cisco and Tufin. Symantec could be in hot water, and CA and Palo Alto both made a recent acquisition. All that and more, on this episode of Enterprise Security Weekly! Full Show Notes: https://wiki.securityweekly.com/ES_Episode87 Visit https://www.securityweekly.com/esw for all the latest episodes!
This week, IdentityMind Global raised $10M Series C, DataVisor raised $40M Series C, Infocyte raised $5.2 series B, and more business security news! Full Show Notes: https://wiki.securityweekly.com/BSWEpisode74 Visit http://securityweekly.com/category/ssw for all the latest episodes!
This week, IdentityMind Global raised $10M Series C, DataVisor raised $40M Series C, Infocyte raised $5.2 series B, and more business security news! Full Show Notes: https://wiki.securityweekly.com/BSWEpisode74 Visit http://securityweekly.com/category/ssw for all the latest episodes!
This week, Michael and Paul interview Joe Kay, Founder & CEO of Enswarm! In the Tracking Security Information segment, IdentityMind Global rasied $10M, DataVisor raised $40M, & Infocyte raised $5.2M! Last but not least, our second feature interview with Sean D'Souza, author of The Brain Audit! All that and more, on this episode of Business Security Weekly! Full Show Notes: https://wiki.securityweekly.com/BSWEpisode74 Visit https://www.securityweekly.com/bsw for all the latest episodes!
This week, Michael and Paul interview Joe Kay, Founder & CEO of Enswarm! In the Tracking Security Information segment, IdentityMind Global rasied $10M, DataVisor raised $40M, & Infocyte raised $5.2M! Last but not least, our second feature interview with Sean D'Souza, author of The Brain Audit! All that and more, on this episode of Business Security Weekly! Full Show Notes: https://wiki.securityweekly.com/BSWEpisode74 Visit https://www.securityweekly.com/bsw for all the latest episodes!
In today's podcast we hear about possible hacks of NATO websites during last week's Alliance meetings. South Asia's scissors-and-paste cyber espionage campaign is surprisingly effective. ISIS and al Qaeda vie for jihadist mindshare, and Anonymous hits government sites in Zimbabwe and South Africa. A hacker/hacktivist dumps what he claims to be Kindle credentials, but analysts are dubious about their provenance. Eleanor Mac malware targets webcams. State Department emails remain under investigation. Chris Gerritz from Infocyte tells us about threat hunting, and Charles Clancy from the Hume Center at Virginia Tech shares concerns about data privacy. Plus, Pokémon Go seems to be catching 'em all—Ash Ketcham, call your office.
Security Current podcast - for IT security, networking, risk, compliance and privacy professionals
At the second Security Current Security Shark Tank competition held during Black Hat in Las Vegas, six up and coming cybersecurity providers came face-to-face with some 20 Chief Information Security Officers (CISOs). The startups were: Dtex Systems, Infocyte, Cymmetria, Datex Inc, Wombat Security and Syncurity. After each startup's interaction with the Security Sharks, Security Current's Vic Wheatman spoke with the speaker for a quick hit podcast. Hear the results.