Podcasts about RSA Security

  • 67PODCASTS
  • 106EPISODES
  • 36mAVG DURATION
  • 1MONTHLY NEW EPISODE
  • Apr 26, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about RSA Security

Latest podcast episodes about RSA Security

Moments with Marianne
GenAI Tools & Cybersecurity with Etay Maor

Moments with Marianne

Play Episode Listen Later Apr 26, 2025 8:39


Is GenAI safe to use or should we be cautious when using these tools? Tune in for an inspiring discussion with Etay Maor, Chief Security Strategist at Cato Networks on the 2025 Cato CTRL Threat Report.Moments with Marianne airs in the Southern California area on KMET1490AM & 98.1 FM, an ABC Talk News Radio affiliate! Etay Maor is the chief security strategist at Cato Networks, a founding member of Cato CTRL, and an industry-recognized cybersecurity researcher.  Prior to joining Cato in 2021, Etay was the chief security officer for IntSights (acquired by Rapid7), where he led strategic cybersecurity research and security services. Etay has also held senior security positions at Trusteer (acquired by IBM), where he created and led breach response training and security research, and RSA Security's Cyber Threats Research Labs, where he managed malware research and intelligence teams. Etay is an adjunct professor at Boston College and is part of the Call for Paper (CFP) committees for the RSA Conference and Qubits Conference. Etay holds a Master's degree in Counterterrorism and Cyber-Terrorism and a Bachelor's degree in Computer Science from IDC Herzliya. www.catonetworks.com/report  For more show information visit: www.MariannePestana.com

The School for Humanity
#131 "From Data to Impact: Driving Growth and Leadership in Marketing with Pooja Khandelwal and Lisa Bennett"

The School for Humanity

Play Episode Listen Later Mar 31, 2025 37:40


Pooja Khandelwal is a dynamic Marketing Leader with over a decade of experience driving growth in SaaS and B2B industries. She specializes in crafting data-driven strategies that boost engagement, optimize lead funnels, and deliver measurable ROI. Pooja is known for building cross-functional collaboration, fostering people-first cultures, and scaling marketing initiatives that leave a lasting impact. Website: https://www.civrobotics.com/  LinkedIn: https://www.linkedin.com/in/poojakhandelwal2024/ YouTube: https://www.youtube.com/@civrobotics  Instagram: https://www.instagram.com/civrobotics/#    Lisa Bennett is a seasoned marketer with over 25 years of experience working in a range of global tech companies. Most recently, she served as CMO at Kaltura, where she oversaw everything from marketing strategy to demand generation, public relations, and brand experience. In 2021, she played a key role in preparing the company for its successful IPO on Nasdaq. Lisa is a member of Israel's Global CMO (G-CMO) community and a contributor to the Forbes Communications Council. Prior to her tenure at Kaltura, Lisa managed PR and communications at Cyota, where she contributed to its acquisition by RSA Security for $145 million. She then moved on to directing PR and marketing for RSA's consumer business arm. Lisa is passionate about balancing the art and science of marketing while enjoying time with her four kids and dedicating herself to volunteer work. Website: https://wevo.energy/  LinkedIn: https://www.linkedin.com/in/lishkee/  YouTube: https://www.youtube.com/channel/UCwBpp5pV4TJu77LRvrt0R7Q    In this episode, we explore marketing insights, AI trends, and strategic growth with Pooja and Lisa.    Apply to join our marketing mastermind group: https://notypicalmoments.typeform.com/to/hWLDNgjz Follow No Typical Moments at: Website: https://notypicalmoments.com/ LinkedIn: https://www.linkedin.com/company/no-typical-moments-llc/ YouTube: https://www.youtube.com/channel/UC4G7csw9j7zpjdASvpMzqUA Instagram: https://www.instagram.com/notypicalmoments Facebook: https://www.facebook.com/NTMoments

The NTM Growth Marketing Podcast
#131 "From Data to Impact: Driving Growth and Leadership in Marketing with Pooja Khandelwal and Lisa Bennett"

The NTM Growth Marketing Podcast

Play Episode Listen Later Mar 31, 2025 37:40


Pooja Khandelwal is a dynamic Marketing Leader with over a decade of experience driving growth in SaaS and B2B industries. She specializes in crafting data-driven strategies that boost engagement, optimize lead funnels, and deliver measurable ROI. Pooja is known for building cross-functional collaboration, fostering people-first cultures, and scaling marketing initiatives that leave a lasting impact. Website: https://www.civrobotics.com/  LinkedIn: https://www.linkedin.com/in/poojakhandelwal2024/ YouTube: https://www.youtube.com/@civrobotics  Instagram: https://www.instagram.com/civrobotics/#    Lisa Bennett is a seasoned marketer with over 25 years of experience working in a range of global tech companies. Most recently, she served as CMO at Kaltura, where she oversaw everything from marketing strategy to demand generation, public relations, and brand experience. In 2021, she played a key role in preparing the company for its successful IPO on Nasdaq. Lisa is a member of Israel's Global CMO (G-CMO) community and a contributor to the Forbes Communications Council. Prior to her tenure at Kaltura, Lisa managed PR and communications at Cyota, where she contributed to its acquisition by RSA Security for $145 million. She then moved on to directing PR and marketing for RSA's consumer business arm. Lisa is passionate about balancing the art and science of marketing while enjoying time with her four kids and dedicating herself to volunteer work. Website: https://wevo.energy/  LinkedIn: https://www.linkedin.com/in/lishkee/  YouTube: https://www.youtube.com/channel/UCwBpp5pV4TJu77LRvrt0R7Q    In this episode, we explore marketing insights, AI trends, and strategic growth with Pooja and Lisa.    Apply to join our marketing mastermind group: https://notypicalmoments.typeform.com/to/hWLDNgjz Follow No Typical Moments at: Website: https://notypicalmoments.com/ LinkedIn: https://www.linkedin.com/company/no-typical-moments-llc/ YouTube: https://www.youtube.com/channel/UC4G7csw9j7zpjdASvpMzqUA Instagram: https://www.instagram.com/notypicalmoments Facebook: https://www.facebook.com/NTMoments

PreSales Podcast by PreSales Collective
From Novice to Expert: Presales Career Paths with Kalyan Ramkumar

PreSales Podcast by PreSales Collective

Play Episode Listen Later Mar 10, 2025 33:05


In this episode, Jack Cochran and Matthew James talk with Kalyan Ramkumar about his journey from novice to expert in the presales field. Kalyan shares his experience starting as an SDR at RSA Security with no technical background and how he worked his way up to become a skilled solutions engineer. He discusses the importance of domain knowledge in security, his framework for effective demos, and strategies for managing POCs and building your internal brand. To join the show live, follow the Presales Collective's LinkedIn page or join the PSC Slack community for updates. The show is bi-weekly on Tuesdays, 8AM PT/11AM ET/4PM GMT. Follow the Hosts Connect with Jack Cochran: https://www.linkedin.com/in/jackcochran/ Connect with Matthew James: https://www.linkedin.com/in/matthewyoungjames/ Connect with Kalyan Ramkumar: https://www.linkedin.com/in/kalyan-ramkumar-679927151/ Links and Resources Mentioned Join Presales Collective Slack: https://www.presalescollective.com/slack Presales Collective Linkedin: https://www.linkedin.com/company/presalescollective Presales Collective newsletter: https://www.presalescollective.com/newsletter CompTIA Security+ Certification: https://www.comptia.org/certifications/security CompTIA Network+ Certification: https://www.comptia.org/certifications/network Timestamps 00:00 Introduction 03:15 Kal's Background 10:12 First Ever Demo 14:10 When did you know you're an SC 19:40 The Four Do's of Demos 23:35 Challenging the challenger 27:02 Building your personal brand 29:35 POC strategies  Key Topics Covered Breaking into Presales Starting as an SDR and transitioning to SE Getting hired without technical background Importance of work ethic and eagerness to learn Building Domain Expertise Value of security certifications (Security+ and Network+) Moving from scripted to fluid demos Building trust with technical customers Demo Framework: The Four Do's Conducting your own discovery Framing every click and feature Evaluating specific customer KPIs Challenging difficult stakeholders POC and Success Strategies Customizing POC length to customer needs Collaborating with account executives Building internal relationships Creating workshop sequences for implementation

InfosecTrain
What is RSA Archer?

InfosecTrain

Play Episode Listen Later Dec 12, 2024 5:38


The software platform known as RSA Security is the creator of RSA Archer, a comprehensive solution designed for managing and enhancing an organization's risk and compliance processes. It provides a centralized approach to governance, risk management, and compliance (GRC) processes, enabling organizations to proactively manage risks, guarantee regulatory compliance, and improve their overall GRC capabilities. Utilizing RSA Archer allows businesses to improve their GRC skills, ensure regulatory compliance, safeguard their reputation, and assure long-term success in today's competitive business environment. What is RSA Archer? RSA Archer is a powerful software platform developed by RSA Security, a division of Dell Technologies. RSA Archer offers various modules and applications to address risk management, policy and procedure management, compliance management, and more. Organizations can efficiently discover, assess, and manage risks with the help of RSA Archer's adaptable and scalable platform, which also helps to assure regulatory compliance. The platform offers a comprehensive GRC solution with centralized data management, automation capabilities, and robust security features. View More: What is RSA Archer?

עוד פודקאסט לסטארטאפים
ברק שוסטר - מאקזיט של 200 מיליון דולר כיזם, לכיסא המשקיע ואילו השקעות "חמות" בעת הזו

עוד פודקאסט לסטארטאפים

Play Episode Listen Later Oct 20, 2024 45:45


ברק שוסטר הוא שותף-מייסד ו-CTO לשעבר ב-Bridgecrew, סטארט-אפ אבטחת סייבר בקוד פתוח, שנרכש ב-2021 על ידי Palo Alto Networks ב-200 מיליון דולר, וכיום הוא שותף בקרן ההון-סיכון Battery.ברק עובד עם הצוות הגלובלי של החברה ומחפש אחר חברות עם נוכחות עולמית בתחומי הסייבר, תוכנות קוד פתוח, DevOps, תשתיות ענן, נתונים, ו-Machine Learning. הוא מומחה בבניית חברות קוד פתוח, חברות עם מודל עסקי מבוסס מוצר (PLG), ומעורב בהשקעה של Battery ב-Mine וכן בהשקעת הסיד ב-Wing Cloud.לפני הצטרפותו לבאטרי, היה ברק מנהל בכיר וארכיטקט ראשי ב-Palo Alto Networks, והוביל בקרן קידום מפתחים, מאמצי ארכיטקטורה ויוזמות קוד פתוח ו-PLG.מוקדם יותר בקריירה, עבד כארכיטקט תוכנה ומהנדס נתונים בסטארט-אפ Fortscale, שנרכש על ידי RSA Security. לפני כן, ניהל צוות הנדסה שהתמקד בביג דאטה ו-Machine Learning בצה"ל. לברק תואר ראשון במדעי המחשב מהמכללה למנהל, ותואר שני במנהל עסקים בטכנולוגית מידע מאוניברסיטת בר-אילן.   (*) ללינקדאין שלי: https://www.linkedin.com/in/guykatsovich/ (*) לאינסטגרם שלי: https://www.instagram.com/guykatsovich/ (*) עקבו אחרינו ב"עוד פודקאסט לסטארטאפים" וקבלו פרק מדי שבוע: ספוטיפיי:https://open.spotify.com/show/0dTqS27ynvNmMnA5x4ObKQ אפל פודקאסט:https://podcasts.apple.com/podcast/id1252035397 גוגל פודקאסט:https://bit.ly/3rTldwq עוד פודקאסט - האתר שלנו:https://omny.fm/shows/odpodcast ה-RSS פיד שלנו:https://www.omnycontent.com/.../f059ccb3-e0c5.../podcast.rssSee omnystudio.com/listener for privacy information.

She Said Privacy/He Said Security
A CISO's Guide To Using AI in Governance, Risk, & Compliance Programs

She Said Privacy/He Said Security

Play Episode Listen Later Sep 26, 2024 30:47


Rob Black is the Founder of Fractional CISO and has guided numerous companies in enhancing their security postures. With extensive experience in product and corporate security roles at prominent companies like PTC, Axeda, and RSA Security, Rob is recognized as a trusted authority in risk management and cybersecurity innovation. In this episode… As companies face increasing pressure to meet security and compliance demands, many are turning to AI to enhance their governance, risk, and compliance programs. Tools like ChatGPT and Claude can streamline processes such as summarizing reports and generating responses to security questionnaires. While these tools can improve efficiency, they can also produce inaccuracies, underscoring the importance of human oversight. How can companies use AI responsibly to enhance these programs? AI tools can save security teams a ton of time, but they're not reliable enough to replace human oversight. This means that companies need to establish clear guidelines and governance frameworks on AI usage to protect sensitive information and mitigate risks. By integrating these strategies, companies can build more resilient and compliant programs.  In this episode of She Said Privacy/He Said Security, Jodi and Justin Daniels talk with Rob Black, the Founder of Fractional CISO, about integrating AI into governance, risk, and compliance programs. Rob explores the benefits and risks of utilizing AI in these programs, emphasizing the need to blend AI with human oversight. He also emphasizes the need for companies to have a security-first mindset when implementing AI tools to reduce risk and ensure long-term success.

A Different Perspective
A Different Perspective with Marc Adams, CEO of Acquisitions4you

A Different Perspective

Play Episode Listen Later Jun 4, 2024 53:44


This week Nick talks to Marc AdamsMarc Adams is the CEO of Acquisitions4you, a specialized business consultancy firm that focuses on facilitating mergers and acquisitions (M&A) for small to mid-sized companies. They provide end-to-end support throughout the acquisition process, ensuring that their clients achieve strategic growth objectives. The firm's services include identifying potential acquisition targets, conducting comprehensive due diligence, negotiating terms, and managing the integration process post-acquisition. By leveraging their extensive network and industry expertise, Acquisitions4you helps businesses navigate the complexities of M&A transactions, ensuring that both the financial and operational aspects are thoroughly addressed to maximize value and minimize risks.Before Acquisitions4you, Marc served as an Advisor at Flatworld Solutions, having significantly enhanced client profitability by outsourcing specialized tasks in financial service and insurance, creating over $100M in value. As a NED at JBTM Group, Marc achieved similar value creation through strategic growth and productivity improvements. As MD EMEA at RSA Security, Marc led a team to deliver $25M in software sales with significant year-over-year growth. Marc's tenure at Thomson Reuters involved turning around the EMEA business and expanding in emerging markets. Earlier roles include senior sales and engineering positions at Centennial Software, Clearswift, EMC Corporation, Sun Microsystems, Monotype, and Intersolve, where they consistently drove successful mergers and acquisitions, brand equity, and exit strategies.Nick and Mark talk about Marc's life and his career and focus on Marc's new book - Secrets to 10xing Your Business and Cashing Out Tax-Free, the book gives guidance on how you can reshape the destiny of your business with strategies proven to not only multiply its worth but also to ensure a lucrative exit when the time is ripe. They cover chapters from the book, Power of Digital Marketing and Tax-Free Selling: Preparing for the Exit.  Marc's book choices where -  Secrets to 10xing Your Business and Cashing Out Tax by Marc Adamshttps://www.amazon.co.uk/Secrets-10Xing-Your-Business-Tax-Free/dp/B0CRXPBB4TDotCom Secrets: The Underground Playbook for Growing Your Company Online by Russell Brunsonhttps://www.amazon.co.uk/DotCom-Secrets-Underground-Playbook-Growing/dp/1630474770This content is issued by Zeus Capital Limited (“Zeus”) (Incorporated in England & Wales No. 4417845), which is authorised and regulated in the United Kingdom by the Financial Conduct Authority (“FCA”) for designated investment business, (Reg No. 224621) and is a member firm of the London Stock Exchange. This content is for information purposes only and neither the information contained, nor the opinions expressed within, constitute or are to be construed as an offer or a solicitation of an offer to buy or sell the securities or other instruments mentioned in it. Zeus shall not be liable for any direct or indirect damages, including lost profits arising in any way from the information contained in this material. This material is for the use of intended recipients only.

PEBCAK Podcast: Information Security News by Some All Around Good People
Episode 160 - RSA Security Conference Recap, LockBit Ransomware Group Leader Revealed, ChatGPT for Spies, Teacher Appreciation Week

PEBCAK Podcast: Information Security News by Some All Around Good People

Play Episode Listen Later May 13, 2024 45:49


Welcome to this week's episode of the PEBCAK Podcast!  We've got four amazing stories this week so sit back, relax, and keep being awesome!  Be sure to stick around for our Dad Joke of the Week. (DJOW) Follow us on Instagram @pebcakpodcast   RSAC 2024 wrap up https://www.cnet.com/tech/services-and-software/generative-ai-muddies-the-election-2024-outlook-and-voters-are-worried/ https://siliconangle.com/2024/05/11/rsa-conference-2024-goes-beyond-ai-powered-security-securing-ai/   Leader of LockBit ransomware gang revealed https://krebsonsecurity.com/2024/05/u-s-charges-russian-man-as-boss-of-lockbit-ransomware-group/ https://x.com/NCA_UK/status/1789566462975226004   Microsoft launches ChatGPT for spies https://arstechnica.com/information-technology/2024/05/microsoft-launches-ai-chatbot-for-spies/  https://www.bloomberg.com/news/articles/2024-05-07/microsoft-creates-top-secret-generative-ai-service-for-us-spies   National teacher and nurses appreciation week https://nationaltoday.com/teacher-appreciation-week/ https://www.yahoo.com/lifestyle/national-nurses-week-2024-rn-105004648.html     Find the hosts on LinkedIn: Chris - https://www.linkedin.com/in/chlouie/ Brian - https://www.linkedin.com/in/briandeitch-sase/ Glenn - https://www.linkedin.com/in/glennmedina/

Uncharted Podcast
CEO Wisdom: Insights from Amir Orad's Journey Scaling Multiple Companies to 150 Million

Uncharted Podcast

Play Episode Listen Later Apr 23, 2024 18:09


Amir Orad, a seasoned CEO/entrepreneur in AI/analytics, Cyber, and FinTech, has a proven track record of scaling tech companies, including Sisense, Actimize, and Cyota, achieving 9-figure revenues, profitability, and market leadership. As CEO & Chairman of Sisense, revenue grew 17X over eight years to $150M, transitioning to native cloud SaaS and achieving profitability. Sisense serves thousands of customers, recognized as a Visionary/Leader by Gartner, G2 Crowd, and Forrester. Previously, as CEO of NICE Actimize, revenue grew 10x to $200M with over 25% operating income, transitioning to a SaaS/Subscription model. Orad co-founded Cyota, growing it to $100M in bookings in six years before its acquisition by RSA Security. With expertise in mergers and acquisitions, Orad successfully integrated four acquisitions into his companies over 20 years. He's also chaired/boarded companies like AnyWord, Yotpo, SecuriThings, Ava, and BillGuard. Starting his career as a techie, Orad holds patents and is recognized as an industry thought leader in publications like the Wall Street Journal and CNBC. Based in New York, he holds an MBA from Columbia University and a B.Sc in Computer Science and Management from Tel Aviv University, receiving accolades like EY Entrepreneur of the Year and Goldman Sachs' 100 Most Intriguing Entrepreneurs. --- Support this podcast: https://podcasters.spotify.com/pod/show/uncharted1/support

Cybercrime Magazine Podcast
History of RSA Conference. Sandra Toms. RSA Security, 1998-2019

Cybercrime Magazine Podcast

Play Episode Listen Later Apr 10, 2024 19:27


Sandra Toms was previously Vice President & Architect at RSA Conference from 1998 to 2019, during which time the event grew from around 1,200 to 35,000 attendees. Toms shares fond memories of cryptographers, celebrities, headliners, and more. Listen to this special episode on the History of RSA Conference, produced by Cybercrime Magazine.

Cybercrime Magazine Podcast
History of RSA Conference. Dr. Taher Elgamal, RSA Security, 1991-1993

Cybercrime Magazine Podcast

Play Episode Listen Later Apr 4, 2024 13:18


Dr. Taher Elgamal was at the first RSA Conference in 1991. He is an internationally respected information security leader and cryptographer. He was the recipient of the lifetime achievement award from the RSA conference in 2009. He has successfully served as CISO, Chief Scientist, CTO, as well as founder and CEO of numerous key organizations. Dr. Elgamal invented several industry and government standards in data security and digital signatures for areas including the DSS government standard for digital signatures. He is recognized in the industry as the "father" of SSL. Listen to this episode with Dr. Elgamal for some great memories from the early RSA Conferences.

Cybercrime Magazine Podcast
Jim Bidzos, Creator of the RSA Conference, Launched in 1991.

Cybercrime Magazine Podcast

Play Episode Listen Later Apr 1, 2024 34:10


Jim Bidzos is the creator of the RSA Conference. He served as president and CEO of RSA Security from 1986 to 1999, and then served as RSA's vice chairman from 1999 to 2002. The first RSA Conference took place in 1991 and ultimately grew to become the world's largest gathering of security professionals. Listen to Bidzos and find out the true story of why and how the RSA Conference was born. This special episode is a time capsule for the cybersecurity industry.

Cybercrime Magazine Podcast
History Of RSA Conference. Art Coviello, Jr. RSA Security, 1995-2015.

Cybercrime Magazine Podcast

Play Episode Listen Later Mar 19, 2024 20:36


Art Coviello, Jr. spent nearly 20 years with RSA Security, from 1995 to 2015. He held positions including Executive Chairman, CEO, President & COO, and EVP. During his tenure, the RSA Conference grew to become the largest gathering of security professionals in the world. Coviello credits the genius of Jim Bidzos, creator of the RSA Conference, as its driving force. Take a trip down memory lane in this episode and you'll listen to stories and observations about RSA founders Ron Rivest, Adi Shamir and Leonard Adleman, Kevin Mitnick, Bill Gates, Marty Hellman, Whitfield Diffie, and others.

Let's Talk About Digital Identity
Exploring the Importance of Identity Governance with Craig Ramsay, Omada – Podcast Episode 102

Let's Talk About Digital Identity

Play Episode Listen Later Jan 10, 2024 25:27


Let's talk about digital identity with Craig Ramsay, Senior Solutions Architect at Omada. What is Identity Governance and Why is it important? Craig Ramsay, Senior Solutions Architect at Omada joins Oscar to explore all things Identity Governance including – the role of Identity Governance in compliance with regulations and standards, how it affects security and risk management for organisation, alongside some real-world examples of Identity Governance in use. [Transcript below] "We're still trying to shake off the thing that - security is a barrier to efficiency. There's an old adage that ‘efficiency is insecure, but security is inefficient'. But I don't think that's true anymore." Craig Ramsay, Senior Solution Architect at Omada, from Edinburgh, Scotland. I have worked at Omada for 3 years and have previously worked at RSA Security and different financial services organisations in the UK within their Identity functions. Outside of work my main interests are hiking and travelling. Connect with Craig on LinkedIn. We'll be continuing this conversation on LinkedIn using #LTADI – join us @ubisecure! Go to @Ubisecure on YouTube to watch the video transcript for episode 102. Podcast transcript Oscar Santolalla: This week I am joined by Craig Ramsay from Omada, here to discuss the importance of identity governance and how it is helping to solve problems in real-world. Stay tuned to find out more. Let's Talk About Digital Identity, the podcast connecting identity and business. I am your host, Oscar. Oscar: Hello, for today's episode about Identity Governance and Administration, mostly known as IGA, we have invited a super interesting guest who is Craig Ramsay. He is a Senior Solution Architect at Omada. He's from Edinburgh, Scotland. He has worked for Omada for three years and has previously worked at RSA Security and different financial services organisations in the United Kingdom within their identity functions. Outside of work, Craig's main interests are hiking and travelling. Hello, Craig. Craig Ramsay: Hey, Oscar. How are you doing? Oscar: Very good. Nice talking with you. Craig: Thank you, you too. Oscar: So, let's talk about digital identity. As usual, we want to hear more about our guests. Please tell us about yourself and your journey to this world of identity. Craig: Sure. So, I mean, thank you for the introduction. And I guess, in terms of my journey into identity, it was a little bit by fluke rather than by design. I studied Computer Science and when I graduated, I joined an operational IT graduate scheme. They had recently started a new IAM project, because I think back in 2008, identity and access management, identity governance wasn't as mature as it is now. It was still kind of seen as an operational IT project rather than an information security principle. So, the drivers there were more about the efficiency, automated provisioning and stuff. But yeah, they were looking for a graduate on that project. That was me. And apart from a few years where I decided to try what it was like being a policeman, I have worked in identity ever since either for, as you said, financial services organisations doing the work at the coalface or for vendors, either in project delivery or, and you know pre-sales in my solution architect role. Oscar: Excellent. So, let's go first with the basics. We have not talked about IGA yet in this podcast, have not focused on that. So, tell us, what is that? What is Identity Governance and Administration, IGA? What is important? Craig: Sure. So, I mean, identity governance, when you focus on it, at its core, it's a solution that will ensure the right individuals have the right access for the right reasons at the right time in your organisation. So, it's protecting the authorisations or the resource assignments within your organisation. And that's often policy-driven to ensure that all of, and I think the important distinction here when we talk...

Audio News
EVOLUCIÓN DEL MERCADO DE CIBERSEGURIDAD SEGÚN RSA

Audio News

Play Episode Listen Later Sep 28, 2023 4:14


Brian Breton, Vicepresidente del Canal de Ventas y Operaciones de América en RSA Security, compartió las transformaciones y novedades que RSA ha incorporado en el ámbito de la ciberseguridad en América Latina. En el reciente roadshow "LOL Partner Exchange" de Licencias Online.

HR Trends
Transforming the leave experience through real-time data connectivity

HR Trends

Play Episode Listen Later Sep 18, 2023 22:34


Curt Burghardt and Denise Ferguson, Unum HR leaders and people analytics experts, explore how real-time data connectivity with leave and absence information transforms efficiency, transparency and downstream processes for employers managing leave in Workday.® People analytics is more than just basic reporting.  [03:49]Real-time connectivity simplifies leave processes. [06:42]Simplicity saves time and creates a better experience. [08:33]Connectivity helps solve the challenge of intermittent leave.  [10:24]WORKDAY and the WORKDAY logo are trademarks of Workday, Inc. registered in the United States and elsewhere. All other brand and product names are trademarks or registered trademarks of their respective holders.Featured speakersCurt Burghardt  Vice President, People Delivery Group, Unum In his role as Vice President of the People Delivery Group at Unum, Curt Burghardt drives how the organization leverages cutting-edge technology to transform the employee experience — among our own employees and in close partnership with key business partners and customer facing initiatives. Curt lives in Portland, Maine with his wife and their two children. He has lived across the United States — from Hawaii to Boston and several places in between, including Chicago, San Francisco and Denver — during his previous roles with both Walgreens and United Airlines. Denise Ferguson  Assistant Vice President, People & Communications Technology Denise Ferguson is the AVP of People & Communications Technology. She joined Unum in April of 2015 as the AVP of HR Technology. Her responsibilities include enabling strategy through the use of cutting-edge technology and delivery of the technology roadmap for human resources, diversity and inclusion, corporate social responsibility and corporate communications. Prior to her role at Unum, Denise was the Senior Director of Human Resources Information Systems for Smith & Nephew. Before moving into dedicated technology roles, Denise held various functional HR roles in recruiting and compensation, and served as a HRBP and HR Manager for RSA Security, Inc. in Bedford, Massachusetts. Denise earned a Bachelor of Science degree in Business Administration from Boston University.

Jamf After Dark
An update on the RSA Security Conference and the Jamf Spring Event

Jamf After Dark

Play Episode Listen Later Jun 1, 2023 70:05


This episode, listen to  guests Matt Benyo, Matt Woodruff and Jaron Bradley to discuss the latest in how Jamf is helping customers in the security landscape as well as unpack what they presented on and learned at the RSA security conference. Then, hear from Sr. Director of Product Marketing, Jen Kaplan to further hear more about the Jamf Spring Event. Jen elaborates on Jamf Safe Internet and Trusted Access.

ITSPmagazine | Technology. Cybersecurity. Society
The Looming Identity Crisis: Learning to Embrace the Human-AI Symbiosis in Cybersecurity and Identity | ITSPmagazine Event Coverage: RSAC 2023 San Francisco, USA | A Conversation with Rohit Ghai

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Apr 21, 2023 26:15


Guest: Rohit Ghai, Chief Executive Officer of RSA Security [@RSAsecurity]On LinkedIn | https://www.linkedin.com/in/rohitghai/On Twitter | https://twitter.com/rohit_ghaiAt RSAC | https://www.rsaconference.com/experts/rohit-ghai____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________This Episode's SponsorsBlackCloak | https://itspm.ag/itspbcwebBrinqa | https://itspm.ag/brinqa-pmdpSandboxAQ | https://itspm.ag/sandboxaq-j2en____________________________Episode NotesIn this Chats on the Road to RSA Conference 2023 podcast episode, Rohit Ghai, Chief Executive Officer of RSA Security, discusses the thought process that went into his declaring the looming identity crisis in the cybersecurity industry as the topic for his keynote session. Ghai examines the prominence of identity in cybersecurity and the impact of AI on human roles in the field. Sean Martin and Marco Ciappelli appeal to Ghai to explore the complexities of managing human and machine identities, the evolution of identity professionals' roles, and the significance of aligning AI with human values and business outcomes.As AI becomes more pervasive and powerful, the conversation highlights the challenges of aligning AI with human values while grappling with the complexities of managing identities in an increasingly automated world. The conversation also focuses on the transformation of identity professionals' roles, emphasizing the need for a shift from hands-on tasks to a supervisory role where they can focus on high-value problems and decision-making.____________________________ResourcesKeynote Session | The Looming Identity Crisis: https://www.rsaconference.com/usa/agenda/session/Forging-a-New-AlloyLearn more, explore the agenda, and register for RSA Conference: https://itspm.ag/rsa-cordbw____________________________For more RSAC Conference Coverage podcast and video episodes visit: https://www.itspmagazine.com/rsa-conference-usa-2023-rsac-san-francisco-usa-cybersecurity-event-coverageAre you interested in telling your story in connection with RSA Conference by sponsoring our coverage?

Redefining CyberSecurity
The Looming Identity Crisis: Learning to Embrace the Human-AI Symbiosis in Cybersecurity and Identity | ITSPmagazine Event Coverage: RSAC 2023 San Francisco, USA | A Conversation with Rohit Ghai

Redefining CyberSecurity

Play Episode Listen Later Apr 21, 2023 26:15


Guest: Rohit Ghai, Chief Executive Officer of RSA Security [@RSAsecurity]On LinkedIn | https://www.linkedin.com/in/rohitghai/On Twitter | https://twitter.com/rohit_ghaiAt RSAC | https://www.rsaconference.com/experts/rohit-ghai____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________This Episode's SponsorsBlackCloak | https://itspm.ag/itspbcwebBrinqa | https://itspm.ag/brinqa-pmdpSandboxAQ | https://itspm.ag/sandboxaq-j2en____________________________Episode NotesIn this Chats on the Road to RSA Conference 2023 podcast episode, Rohit Ghai, Chief Executive Officer of RSA Security, discusses the thought process that went into his declaring the looming identity crisis in the cybersecurity industry as the topic for his keynote session. Ghai examines the prominence of identity in cybersecurity and the impact of AI on human roles in the field. Sean Martin and Marco Ciappelli appeal to Ghai to explore the complexities of managing human and machine identities, the evolution of identity professionals' roles, and the significance of aligning AI with human values and business outcomes.As AI becomes more pervasive and powerful, the conversation highlights the challenges of aligning AI with human values while grappling with the complexities of managing identities in an increasingly automated world. The conversation also focuses on the transformation of identity professionals' roles, emphasizing the need for a shift from hands-on tasks to a supervisory role where they can focus on high-value problems and decision-making.____________________________ResourcesKeynote Session | The Looming Identity Crisis: https://www.rsaconference.com/usa/agenda/session/Forging-a-New-AlloyLearn more, explore the agenda, and register for RSA Conference: https://itspm.ag/rsa-cordbw____________________________For more RSAC Conference Coverage podcast and video episodes visit: https://www.itspmagazine.com/rsa-conference-usa-2023-rsac-san-francisco-usa-cybersecurity-event-coverageAre you interested in telling your story in connection with RSA Conference by sponsoring our coverage?

Founder Real Talk
Idan Tendler, SVP of Application Security at Palo Alto Networks, on Nailing Go-To-Market and Learning From Mistakes

Founder Real Talk

Play Episode Listen Later Mar 23, 2023 37:17


Idan Tendler is the Senior Vice President of Application Security at Palo Alto Networks, as well as the chairman and co-founder of Place-IL, a nonprofit tech initiative. Idan discusses his previous cybersecurity analytics startup, Fortscale (later acquired by RSA Security), and some key lessons he learned from his experience building the company. Before Fortscale, Idan founded Bridgecrew, a company that helps developers better secure their cloud environment. With the goal of to making developers love security—a seemingly impossible task—Bridgecrew built an open-source product called Checkov, which allowed the company to get millions of developers to use their product. Today, Idan is also busy building Place-IL, a non-profit initiative that helps connect immigrants to Israel with job opportunities in the country's tech industry.

Marketing Unplugged
Laura Marx — A CMO's journey: From marketing professional to leader

Marketing Unplugged

Play Episode Listen Later Jan 13, 2023 44:06


Laura Marx is the CMO of RSA Security and has built and led global marketing teams throughout her career. As a remote worker for over a decade, Laura shares her thoughts on how to be a leader from afar, offers some solid advice to aspiring first-time CMOs, and shares her own journey from being a marketing professional to a leader.   Key Takeaways: [2:00] Laura got her start as a tennis instructor, how did she go from that to becoming a marketing lead? [4:30] How did Laura develop her skills as a leader while she was working from home over the last decade? [6:20] At one point in Laura's career, she was told she'd never be VP because she was remote. Leadership ended up changing and they were located all over, and she was later promoted. The mindset has to start from the top. [7:30] How do you foster a connection when you have a remote team? [12:00] Product marketing is really the center of the business. A good CMO should get good at this aspect of marketing. [14:00] Should CMOs have an MBA? [16:10] Why is Art of Possibility one of Laura's favorite books? [17:20] You have to question your assumptions. [19:10] What does a high-performing team look like? [26:20] Mistakes have to be part of the ecosystem that you're in. [29:15] What marketing challenges are keeping Laura up at night? [32:30] As a parent and executive, how does Laura find the right balance between work and parent life? [36:20] Laura answers some rapid-fire questions! [40:40] Being a leader means you have to make very difficult decisions and you're not always going to be liked for it.   Mentioned in This Episode: Rsa.com Laura on LinkedIn The Art of Possibility, by Benjamin Zander and Rosamund Stone Zander  

Sales vs. Marketing
Lessons - How To Build a Sales Team | Shawn Cruise, VP Sales at RSA

Sales vs. Marketing

Play Episode Listen Later Dec 29, 2022 12:28


➡️ Like The Podcast? Leave A Rating: https://ratethispodcast.com/successstory   ➡️ About The Guest⁣ Shawn Cruise is a tenured sales leader with over 30 years of experience. Shawn's been instrumental in scaling incredible companies such as Corel, Adobe, QNX and most recently RSA Security. He's spent his entire career focused on building growth teams, developing people and accelerating innovation in complex SaaS and Cloud sales programs. ➡️ Show Links https://www.linkedin.com/in/shawn-cruise-5199803 ➡️ Watch the Episodes On Youtube https://www.youtube.com/c/scottdclary Learn more about your ad choices. Visit podcastchoices.com/adchoices

eXecutive Security
Looking for Cybersecurity Employees in New Ways With Dan Schiappa of Arctic Wolf

eXecutive Security

Play Episode Listen Later Sep 30, 2022 16:32


Dan Schiappa, the chief product officer at Arctic Wolf, has been a technology leader for many years at organizations including Sophos, RSA Security, and Microsoft.LinkedIn: https://www.linkedin.com/in/daniel-schiappa-bbb1062/University of Central Florida News: https://www.ucf.edu/news/cybersecurity-team-wins-4th-national-championship/Arctic Wolf: https://arcticwolf.com/company/careers/ 

AI in Action Podcast
E369 Howard Ting, CEO at CyberHaven

AI in Action Podcast

Play Episode Listen Later Aug 1, 2022 19:50


Today's guest is Howard Ting, CEO at CyberHaven in Palo Alto, CA. Every day, millions of sensitive documents, files and other data are being exfiltrated because traditional data security products have failed to do their job, resulting in an estimated $600 billion annual cost to the US economy. These data breaches cause severe near and long-term impact, including stolen IP, business interruptions, loss of customer trust, weakened competitiveness and significant financial penalties. Cyberhaven will help organizations secure all of the data they must protect in order to compete and thrive in the digital economy. It's one big hairy problem but Cyberhaven are up to the challenge. Howard joined Cyberhaven as CEO in June 2020 and in the past decade, he has played a critical role in scaling Palo Alto Networks and Nutanix from initial sales to over $1billion in revenue, generating massive value for customers, employees and shareholders. Howard has also served in GTM and product roles at Redis Labs, Zscaler, Microsoft and RSA Security. In the episode, Howard will discuss: The work CyberHaven are doing within Data protection, What's new and innovative approach their approach to the market, How they are applying AI at CyberHaven, The day-to-day life within the tech team, What's in store for the near future, & Why CyberHaven are a great place to work

Data Privacy Detective - how data is regulated, managed, protected, collected, mined, stolen, defended and transcended.

Protecting and using personal information has focused on computer and software technology. With the Internet of Things (IoT), the Edge has arrived – the place where devices and traditional data infrastructure connect. Niranjan Maka takes us on a tour of the Edge and explains what it means to enterprises and individuals and the risks the Edge creates for us all. Niranjan heads SmartHub.ai, Enterprise IoT Platform | Smarthub.ai, an Edge company spun out from VMware, focused on bringing AI/ML powered management and monitoring to IoT/Edge devices. Our physical presence is replete with siloed millions of devices and sensors that collect, process, and share our personal information and enterprise data. As a veteran holding leadership positions at companies like RSA Security, Niranjan explains how we must become aware of the devices and sensors that are constantly with us and how the Edge changes how enterprises and individuals manage data and affect how our personal information is gathered and used. Tune in for an introduction to the Edge. Learn what enterprises and individuals can do about it, both to manage well in the IoT age and to protect our personal information. If you have ideas for more interviews or stories, please email info@thedataprivacydetective.com.

Winning the Challenger Sale
#23 Opportunity Prioritization with Johnathan Bald, Area Vice President of Large Enterprise Sales Netwitness - Canada & US East at RSA Security

Winning the Challenger Sale

Play Episode Listen Later May 17, 2022 35:41


In this episode of Winning the Challenger Sale, hosted by Jen, Johnathan Bald, Area Vice President of Large Enterprise Sales Netwitness - Canada & US East at RSA Security, discusses the fundamentals of qualifying, disqualifying, and prioritizing opportunities. Johnathan explains how the unique market fit and the maturity of an organization influence the likelihood of qualifying or disqualifying a prospect, and factors that influence internal opportunity prioritization.

Winning the Challenger Sale
#23 Opportunity Prioritization with Johnathan Bald, Area Vice President of Large Enterprise Sales Netwitness - Canada & US East at RSA Security

Winning the Challenger Sale

Play Episode Listen Later May 17, 2022 35:41


In this episode of Winning the Challenger Sale, hosted by Jen, Johnathan Bald, Area Vice President of Large Enterprise Sales Netwitness - Canada & US East at RSA Security, discusses the fundamentals of qualifying, disqualifying, and prioritizing opportunities. Johnathan explains how the unique market fit and the maturity of an organization influence the likelihood of qualifying or disqualifying a prospect, and factors that influence internal opportunity prioritization.

20 Minute Leaders
Ep690: Amir Orad | CEO of Sisense

20 Minute Leaders

Play Episode Listen Later Dec 27, 2021 22:34


Amir is Sisense CEO and chairman of the board - focusing on infusing analytics and business intelligence in every application and every user. Amir has led startups to become industry leaders with hundreds of millions in revenue and multiple M&As. He is a serial entrepreneur, specializing in growing big data and cybersecurity businesses, with over 25 years of experience as a leader in these fields. During his previous tenure at NICE Actimize, he grew the business 10x to a $200M revenue run rate. Previously he was co-founder of Cyota, which he sold to RSA Security. He lives in New York, father of three, holds an MBA from Columbia University and has been acknowledged as a Top 50 SaaS CEO.

FinTech Silicon Valley
John Lunn, Founder/CEO Gr4vy

FinTech Silicon Valley

Play Episode Listen Later Dec 10, 2021 11:41


John Lunn is the Founder and CEO of cloud payment orchestration platform Gr4vy. He is a technology and fintech entrepreneur with 21 years of experience working and investing in financial services, commerce enablement, e-payments, data, security and infrastructure. Lunn worked as the Director of Technology for six years at CyberSource, the world's first payment service provider, which was sold to Visa for $2Bn in 2010. He then helped found Passmark Security which was sold to RSA Security in 2006. In 2006, Lunn joined PayPal as the fourth employee in the UK (now 2,000+), where as Global Director of Developer and Startup Relations, he built and grew PayPal's first Developer Relations team. In 2015, he was instrumental to the purchase of Braintree by PayPal and joined the team. In 2016, Lunn was part of the team that launched PayPal Ventures, the venture capital arm of PayPal, a $350m fund with backing from the Board. Lunn was a Board Observer for Dosh, Arkose, Raise, Acorns, Toss and many others.

20 Minute Leaders
Ep646: Idan Tendler | Co-founder & CEO of Bridgecrew

20 Minute Leaders

Play Episode Listen Later Nov 17, 2021 23:32


Idan is a serial entrepreneur, VP of the DevSecOps product line in the Prisma Cloud Business Unit at Palo Alto Networks. He was previously co-founder and CEO of Bridgecrew, a pioneer in cloud security solutions for developers, which was acquired by Palo Alto Networks in March 2021 for $200M,  less than two years after it was founded. Idan was also the co-founder and CEO of Fortscale, a leading User Behaviour Analytics startup, which was acquired by RSA Security in 2018. Before that he was founder and head of the cybersecurity business unit at Elbit Systems, Israel's leading defense integrator, and served in the IDF's elite Intelligence & Cyber Unit, 8200.

כל תכני עושים היסטוריה
[Malicious Life] RSA Breach FollowUp: Are We Doing Security Right?

כל תכני עושים היסטוריה

Play Episode Listen Later Aug 16, 2021 45:10


Nate Nelson talks to Art Coviello, Former CEO of RSA Security, and Malcolm Harkins, Vice President & Chief Security Officer at Intel, about the current cyber security landscape - 10 years after the RSA Breach.

Malicious Life
RSA Breach FollowUp: Are We Doing Security Right? [ML B-Side]

Malicious Life

Play Episode Listen Later Aug 16, 2021 45:09


Nate Nelson talks to Art Coviello, Former CEO of RSA Security, and Malcolm Harkins, Vice President & Chief Security Officer at Intel, about the current cyber security landscape - 10 years after the RSA Breach.

The Partner Channel Podcast
Summer Series Webinar Replay: The Power of Mentorship

The Partner Channel Podcast

Play Episode Listen Later Aug 9, 2021 21:37


Katie Martinez, sits down with Dalyn Wertz, from Comcast Business, as well as one of Dalyn's mentees Annie Fabik from RSA Security. Dalyn offers key advice for people interested in being mentored. Annie describes how this foundational internship drove her career path and taught her the soft skills need to be successful in the channel.

עוד פודקאסט לסטארטאפים
ברידג'קרו מציגים: כך בונים מוצר בשווי 200 מיליון דולר בתוך שנתיים בלבד

עוד פודקאסט לסטארטאפים

Play Episode Listen Later Apr 26, 2021 52:27


בפרק חובה לכל יזם או יזמת של עוד פודקאסט לסטארטאפים אירחנו את גיא איזנקוט, מייסד שותף וסמנכ״ל מוצר של חברת הסטארטאפ ברידג'קרו שנרכשה בפברואר 2021 ע״י פאלו אלטו נטוורקס בסכום של כ-200 מיליון דולר לאחר שנתיים בלבד מיום הקמתה. איזנקוט הסביר איך ניתן למצוא את הבעיה שרוצים לפתור, למה בחרו להפיץ בעזרת קוד פתוח, ואיך בונים מוצר למיליוני משתמשים. הניסיון של איזנקוט בעולם היזמות התחיל בין השנים 2013-2018 בהם היה חלק מהצוות המוביל בפורטסקייל והיה שותף לרכישתה בידי RSA Security האמריקאית. בעברו שירת באגף המודיעין בצה״ל והשתחרר בדרגת רס״ן וכן השלים תואר ראשון בכלכלה והיסטוריה באוניברסיטת ת״א. להרשמה לסדנת הנטוורקינג הבאה (מאי-2021) עם הנחה לעוקבי הפודקאסט: https://eventbuzz.co.il/lp/event/5eqvs (הזינו את קוד הקופון: ODPODCAST) See omnystudio.com/listener for privacy information.

Modern Marketing Engine podcast hosted by Bernie Borges
Planning the Marketing Strategy for a Global Brand

Modern Marketing Engine podcast hosted by Bernie Borges

Play Episode Listen Later Apr 14, 2021 37:43


How would you plan the marketing strategy for a new brand? What are some factors that marketing leaders should take into consideration when rolling out a new product? That is the topic of conversation of this episode of the Modern Marketing Engine podcast, with my guest Armen Najarian. Armen is the CMO at RSA Fraud & Risk Intelligence, which is part of the larger RSA Security, a 38-year old global brand. As his division expanded and with more revenue and customers around the globe, they decided to transform the Fraud & Risk Intelligence division into a stand-alone business. As the CMO, Armen was responsible for creating and implementing the marketing strategy for this new business unit. Listen to the episode to learn how he did it and some key lessons you can implement in your own organization. Creating a Marketing Strategy 1. Assemble a Team “I'm spending a lot of time on organizational design,” Armen says. “I'm working very closely with the HR leader for this business and really plotting up the next three years and the type of organization I need to assemble.” What are the roles you need and what is the hiring priority? Listen to find out. 2. Develop the brand “Second, I'm spending a lot of time thinking about the brand, knowing that we are moving from a product portfolio within the broader RFA family into a more independent business with its own identity. How we describe that business, what we call it, how the product is positioned.” Armen and his team decided to create a new name while taking advantage of the history of its parent company. However, the buyer persona of the new company is different from the persona of RSA Security, which created new challenges. To navigate the complexities of rebranding a global company, Armen hired an external agency to help create a new website and sales collateral pieces. 3. Content Strategy “We have a product called Fraud Action, and that is our risk intelligence team,” he says. “So this is actually the team that investigates the dark web, goes deep undercover and understands the organized crime organizations around the world, uncovering very important and interesting insights. So we take those insights and we actually package those up as services.” This primary research is the fuel for great thought leadership, so they publish Quarterly Trends Reports from the insights, blog posts and a podcast. “Every CMO should have a content strategy. We have 3 or 4 anchor pieces that are evergreen, that we are always refreshing, always publishing, and our Director of Content Strategy is largely accountable and responsible for keeping that pipeline of great content flowing.” Listen to the whole episode to learn about the challenges Armen has faced during this transformation, including organizationals challenges, managing finite resources, prioritizing areas of focus and issues with having a global presence (language and privacy issues).

Wharton FinTech Podcast
Dan Rosen, Founder of Commerce Ventures - Powering the Future of Commerce

Wharton FinTech Podcast

Play Episode Listen Later Feb 19, 2021 33:59


Miguel Armaza sits down with Dan Rosen, Partner and Founder of Commerce Ventures, a sector-focused VC fund, investing in infrastructure and enablers for the Commerce Continuum Dan is also an alum of our very own, Wharton School. We talked about - Dan’s background and why he decided to build Commerce Ventures - The evolution of the fintech industry over the last 20 years - Commerce Ventures investment process - Their approach to building sector theses - The importance of talent, diversity, and mentoring future generations - And a lot more! About Dan Rosen Dan Rosen Partner Dan has been investing in tech startups for 20 years. He founded Commerce Ventures with the vision of creating a sector-focused firm that demonstrably helps its portfolio companies. At Commerce, Dan focuses on technology innovations in the payments, financial services and insurance fields. He serves on the boards of Blooom, ClickSWITCH, Kin and Socure, and participates as an observer on several other portfolio boards, such as BillGO and MX Technologies. Prior to starting Commerce Ventures, Dan was a Principal at Highland Capital Partners, where he focused on mobile and payments-related startups. He has also worked as an Associate at HarbourVest Partners, in Corporate Development at RSA Security, and as a financial services software consultant for American Management Systems (now CGI Group). Dan studied Finance and Information Systems at the University of Pennsylvania and earned an MBA with Distinction from Harvard.

B2B Tech Talk with Ingram Micro
6 Keys to Risk-Based Assurance for Remote Workforces and Security Operations | RSA Series

B2B Tech Talk with Ingram Micro

Play Episode Listen Later Dec 9, 2020 20:04 Transcription Available


As if implementing and maintaining successful IT security organization-wide wasn’t hard enough, now there’s no boundary to where workers can access the network. The pandemic has piled on workforce challenges and security might just be the #1 concern. In this episode, Murtaza Hafizji, a cybersecurity product marketing manager at RSA Security, talks to Keri about… 6 keys security managers need for risk-based assurance of remote workforces and security operations 3 major findings from RSA’s most recent cybersecurity report Which threats will continue challenging security teams in the next year Hear Murtaza in B2B Tech Talk episodes 70 and 96. To join the discussion, follow us on Twitter @IngramTechSol #B2BTechTalk Listen to this episode and more like it by subscribing to B2B Tech Talk on Spotify, Apple Podcasts, or Stitcher. Or, tune in on our website.

Paul's Security Weekly
The Magician Hat - SCW #53

Paul's Security Weekly

Play Episode Listen Later Nov 25, 2020 81:54


This week, we welcome Zulfikar Ramzan, Ph.D., Chief Digital Officer at RSA Security, to talk about how Zero Trust Intersects XDR in Today’s Digital Era! In the second segment, the SCW crew and Dr. Ramzan talk about Cyber Credit Score Industry! Someone made an offhand comment about the Cyber Credit Score Industry on one of our shows a couple weeks ago, so we thought we'd bring it up as a compliance topic. We'll define what we're talking about when it comes to Cyber Credit Scores - what they are intended to do and for whom. Then we'll pick it apart, SCW style!   Show Notes: https://securityweekly.com/scw53 Visit https://securityweekly.com/rsasecurity to learn more about them!   Visit https://www.securityweekly.com/scw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly

Security and Compliance Weekly (audio)
The Magician Hat - SCW #53

Security and Compliance Weekly (audio)

Play Episode Listen Later Nov 25, 2020 81:54


This week, we welcome Zulfikar Ramzan, Ph.D., Chief Digital Officer at RSA Security, to talk about how Zero Trust Intersects XDR in Today’s Digital Era! In the second segment, the SCW crew and Dr. Ramzan talk about Cyber Credit Score Industry! Someone made an offhand comment about the Cyber Credit Score Industry on one of our shows a couple weeks ago, so we thought we'd bring it up as a compliance topic. We'll define what we're talking about when it comes to Cyber Credit Scores - what they are intended to do and for whom. Then we'll pick it apart, SCW style!   Show Notes: https://securityweekly.com/scw53 Visit https://securityweekly.com/rsasecurity to learn more about them!   Visit https://www.securityweekly.com/scw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly

Paul's Security Weekly TV
Zero Trust Intersects XDR in Today’s Digital Era - Zulfikar Ramzan, Ph.D. - SCW #53

Paul's Security Weekly TV

Play Episode Listen Later Nov 25, 2020 33:57


The rapid shift to distributed work, along with radical changes in human behavior, is expanding digital risk for organizations and creating new opportunities for malicious actors. As such, organizations are rethinking how they define trust in securing critical data and resources. This interview will cover how capabilities and trends, such as XDR and passwordless authentication, are empowering organization to “never trust” and “always verify” leveraging unprecedented visibility and insight to protect what matters most.   This segment is sponsored by RSA Security. Visit https://securityweekly.com/rsasecurity to learn more about them!   Visit https://www.securityweekly.com/scw for all the latest episodes! Show Notes: https://securityweekly.com/scw53

B2B Tech Talk with Ingram Micro
Ep. 128 To Build Resiliency, it Takes a Village

B2B Tech Talk with Ingram Micro

Play Episode Listen Later Oct 30, 2020 26:00 Transcription Available


Lessons from 2020: Disruption isn’t when, but if. How’s your org doing when it comes to creating a truly mature operational resiliency? In this episode of B2B Tech Talk, host Keri Roberts speaks with Patrick Potter, Solutions Marketing at RSA Security, about building resiliency into every part of your org. We chatted about: Resiliency vs. recovery Strategies for building resilience (plus cyber resiliency) What you can and can’t predict—and how to be resilient anyway “It takes all the business to look at how they can build resiliency into what they do. It's not just an IT issue.” — Patrick Potter Find out more about resiliency at RSA.com, or if you’re a partner, email rsa-licensing@ingrammicro.com. To join the discussion, follow us on Twitter @IngramTechSol #B2BTechTalk Listen to this episode and more like it by subscribing to B2B Tech Talk on Spotify, Apple Podcasts, or Stitcher. Or, tune in on our website.

B2B Difference Makers
The Data Whisperer: Amandah Magnarelli of RSA Security

B2B Difference Makers

Play Episode Listen Later Oct 29, 2020 19:50


Data isn’t static or lifeless; it tells a story, if you know how to listen. On this episode of B2B Difference Makers, we’re joined by Amandah Magnarelli, Director of Marketing Operations at RSA Security,  Amandah understands that for data to be effective, you have to let it live and breathe through constant feedback from the people it impacts. In this conversation, you’ll hear how she encourages feedback and how she’s tackling the never-ending challenges of database marketing. What does Amandah think it takes to be a B2B Difference Maker? Find out in this episode. Takeaways:   1. Give People Access   Supporting Quote:  Amandah: So what we've done is we've created, you know, a series of dashboards and reports, and really just tried to enable our sales teams and our BDRs or. Uh, you know, SDRs and just really put the tools at the fingertips of the people, give them the, give them the tools, give them the ability to give them the knowledge and teach them. Um, you know, w what is that saying? You know, give a man a fish and eats for a day, or give a person efficiently for a day, teach them how to fish. And they. Eat for a lifetime. Right? So we've sort of, you know, given them the tools and taught them how to fish. Right. And we've, you know, we've taught them, here's the tools. Here's how to change what's in there. Here's how to filter it for your side of the business, your territory, your. Clients your roles, what your doing and the information that you want. And we've coached them on that and gone, you know, team by team person by person and, you know, done all of that training and, and kept up with that.   2. Encourage Feedback   Supporting Quote: Amandah: To me, data, isn't something that's static in in an Excel Spreadsheet or in you know that you'd print out on a page, right? it lives, it breathes and and I need that input and information from folks that you know ok you you predicted that this company was right for me to go after and if i paid attention to all the business that you gave me I would close business faster. And that worked or that didn't work or, you know, and sure I can build other reports around that and see that we're closing business faster, or we're not, or what's happening. But I do talk to the people that are consuming the data, right. And, and that continuous loop and, and follow through of information is. Is really super important. And I think that's what really makes it live and breathe.   3. There Is No One-Size-Fits-All   Supporting Quote:Amandah: There's a bit of a model in terms of, you know, how I've rolled it out. I, I try to keep a bit of the same format, but it has been a, um, It's been a little bit of brute strength, right? It's been, you know, a team by team and in some cases, person by person approach and that's really been globally. Right. And, you know, different people learn in different ways and some people in the group trainings or the team trainings, they didn't. They didn't grasp it and they needed a little more help and they needed a little more, um, a little more TLC. So there've been one-on-one trainings and, and a little more handholding and a little more care. And some people, the team training was way more than they needed. They just needed a few questions answered. Right. So it hasn't been a one size fits all.

Security and Compliance Weekly (audio)

This week, we welcome Steve Schlarman, Integrated Risk Management Strategist at RSA Security, to discuss Integrated Risk Management & Operational Resiliency! In our second segment, we welcome David Mundhenk, Principal Security Consultant at Herjavec Group, and Ivan Tsarynny, Co-Founder and CEO at Feroot Security, to talk about How Backdoors Lead To Breaches & GRC Compliance Issues!   Show Notes: https://wiki.securityweekly.com/scw48 Visit https://securityweekly.com/rsasecurity to learn more about them!   Visit https://www.securityweekly.com/scw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly

Paul's Security Weekly TV
Integrated Risk Management & Operational Resiliency - Steve Schlarman - SCW #48

Paul's Security Weekly TV

Play Episode Listen Later Oct 21, 2020 35:36


2020 has been the perfect storm for risk management planners and practitioners. Steve Schlarman, Director of Product Marketing and GRC Strategist for RSA Archer will provide anecdotes and lessons learned about how Risk management programs have been challenged this year, and how they need to adapt moving forward.   This segment is sponsored by RSA Security. Visit https://securityweekly.com/rsasecurity to learn more about them!   Visit https://www.securityweekly.com/scw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/scw48

Paul's Security Weekly
Black Swan - SCW #48

Paul's Security Weekly

Play Episode Listen Later Oct 21, 2020 82:21


This week, we welcome Steve Schlarman, Integrated Risk Management Strategist at RSA Security, to discuss Integrated Risk Management & Operational Resiliency! In our second segment, we welcome David Mundhenk, Principal Security Consultant at Herjavec Group, and Ivan Tsarynny, Co-Founder and CEO at Feroot Security, to talk about How Backdoors Lead To Breaches & GRC Compliance Issues!   Show Notes: https://wiki.securityweekly.com/scw48 Visit https://securityweekly.com/rsasecurity to learn more about them!   Visit https://www.securityweekly.com/scw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly

The Content Mix Podcast
Do what you love, love what you do – Chris Willman | RSA Security | Regional Marketing Director & EMEA Strategy Lead

The Content Mix Podcast

Play Episode Listen Later Oct 1, 2020 22:46


Chris Willman, regional marketing director and EMEA strategy lead for the identity risk management organization RSA Security, joins Carlota Pico on our latest podcast episode. Chris shares his most memorable marketing moments to date, his advice for creating an ROI-centric model and his top tools for tracking the performance of content and marketing activities. He also discusses his unexpected journey in becoming an author, the works he's written so far and what else is on the horizon.

ITSPmagazine | Technology. Cybersecurity. Society
The Future Of Business | With Dave Martin and Rohit Ghai | An RSA Security Story

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jul 24, 2020 40:00


A Their Story conversation with Sean Martin, Marco Ciappelli, and RSA Security executives, customers, and partners. This is a 3-part podcast and webcast series with RSA Security executives and business leaders along with some of their strategic customers and partners. The series will explore the accelerated digital transformation disruption as organizations evaluate their risk as it maps to their current and future business operations. The 3 episodes include: SECURITY | WORKFORCE | BUSINESS Episode 3: The Future of Business Guests: Rohit Ghai, CEO, RSA Security Dave Martin, CSO, ADP In this third episode, we connect the two previous conversations about the future of security and the future of the workforce to bring things back home to what matters the most: enabling the business to thrive so it can serve its purpose. One of the important things that we have come to realize during this forced digital acceleration is that, ultimately, work is an activity, not a location, and we must enable our workforce to accomplish their task no matter where; no matter when. We must do so efficiently and securely. One other “revelation” is that cybersecurity is a resiliency problem, and only by framing the problem this way we can find the solution that can align our effort to find the best solution as we manage constant change now and into the future. With this two-fold fundamental mindset, we can start to see things differently; all of a sudden the fog clears up and we realize that the customer is not just a number but a relationship. It is not - and it probably never was - about the one time, or a few recurring sales and the money exchanged, but it is about building a relationship that can survive both acclimate and turbulent weather. Being there when it is needed the most - and when is also appreciated the most. Have a listen to this episode, share it, and look back to the others to complete the journey from start to finish (if there is such a thing in the business world). You can find them all here: https://itspmagazine.com/their-stories/business-transformation-series-the-future-of-business-a-their-story-conversation-with-rsa-security And, be sure to visit RSA Security at https://itspm.ag/itsprsaweb to learn more about their offering. Enjoy!

The IT Pro Podcast
SPECIAL EDITION: The building-blocks of sustainable security

The IT Pro Podcast

Play Episode Listen Later Jun 29, 2020 42:54


Since lockdowns came into effect, businesses across the country have been scrambling to institute remote working infrastructure to support employees - but while speed has understandably been a focus, security should not be neglected. In this IT Pro Podcast Special Edition, brought to you in association with RSA Security, we look at how businesses can use the current situation as an opportunity to establish a culture of safe, secure and sustainable remote working within their organisation. We spoke to Just Eat CISO Kevin Fielder and RSA's director of digital risk solutions Angel Grant to examine the cultural, technological and mindset shifts required to support this move, as well as how embracing sustainable remote working can be a true business accelerator, rather than a box-ticking exercise. For more information on how you can prepare your business for secure long-term remote working, download our special report: https://bit.ly/WP-COVID

The History of Computing
Scraping The Surface Of Modern Cryptography

The History of Computing

Play Episode Listen Later Aug 7, 2019 14:43


Welcome to the History of Computing Podcast, where we explore the history of information technology. Because understanding the past prepares us for the innovations of the future! Todays episode is scraping the surface of cryptography. Cryptography is derived from the Greek words kryptos, which stands for hidden and grafein, which stands for to write. Through history, cryptography has meant the process of concealing the contents of a message from all except those who know the key. Dating back to 1900 BC in Egypt and Julius Caesar using substitution cyphers, encryption used similar techniques for thousands of years, until a little before World War II. Vigenere designed the first known cipher thatused an encryption key in the 16th century. Since then with most encryption, you convert the contents, known as plaintext, into encrypted information that's otherwise unintelligible, known as cipher text. The cypher is a pair of algorithms - one to encrypt, the other to decrypt. Those processes are done by use of a key. Encryption has been used throughout the ages to hide messages. Thomas Jefferson built a wheel cypher. The order of the disks you put in the wheel was the key and you would provide a message, line the wheels up and it would convert the message into cypher text. You would tell the key to the person on the other end, they would put in the cypher text and out would pop the message. That was 1795 era encryption and is synonymous with what we call symmetrical key cryptography, which was independently invented by Etienne Bazeries and used well into the 1900s by the US Army. The Hebern rotor machine in the 19th century gave us an electro-mechanical version of the wheel cypher and then everything changed in encryption with the introduction of the Enigma Machine, which used different rotors placed into a machine and turned at different speeds based on the settings of those rotors. The innovations that came out of breaking that code and hiding the messages being sent by the Allies kickstarted the modern age of encryption. Most cryptographic techniques rely heavily on the exchange of cryptographic keys. Symmetric-key cryptography refers to encryption methods where both senders and receivers of data share the same key and data is encrypted and decrypted with algorithms based on those keys. The modern study of symmetric-key ciphers revolves around block ciphers and stream ciphers and how these ciphers are applied. Block ciphers take a block of plaintext and a key, then output a block of ciphertext of the same size. DES and AES are block ciphers. AES, also called Rijndael, is a designated cryptographic standard by the US government. AES usually uses a key size of 128, 192 or 256 bits. DES is no longer an approved method of encryption triple-DES, its variant, remains popular. Triple-DES uses three 56-bit DES keys and is used across a wide range of applications from ATM encryption to e-mail privacy and secure remote access. Many other block ciphers have been designed and released, with considerable variation in quality. Stream ciphers create an arbitrarily long stream of key material, which is combined with a plaintext bit by bit or character by character, somewhat like the one-time pad encryption technique. In a stream cipher, the output stream is based on an internal state, which changes as the cipher operates. That state's change is controlled by the key, and, in some stream ciphers, by the plaintext stream as well. RC4 is an example of a well-known stream cipher. Cryptographic hash functions do not use keys but take data and output a short, fixed length hash in a one-way function. For good hashing algorithms, collisions (two plaintexts which produce the same hash) are extremely difficult to find, although they do happen. Symmetric-key cryptosystems typically use the same key for encryption and decryption. A disadvantage of symmetric ciphers is that a complicated key management system is necessary to use them securely. Each distinct pair of communicating parties must share a different key. The number of keys required increases with the number of network members. This requires very complex key management schemes in large networks. It is also difficult to establish a secret key exchange between two communicating parties when a secure channel doesn't already exist between them. You can think of modern cryptography in computers as beginning with DES, or the Data Encryption Standard, us a 56-bit symmetric-key algorithm developed by IBM and published in 1975, with some tweaks here and there from the US National Security Agency. In 1977, Whitfield Diffie and Martin Hellman claimed they could build a machine for $20 million dollars that could find a DES key in one day. As computers get faster, the price goes down as does the time to crack the key. Diffie and Hellman are considered the inventors of public-key cryptography, or asymmetric key cryptography, which they proposed in 1976. With public key encryption, two different but mathematically related keys are used: a public key and a private key. A public key system is constructed so that calculation of the private key is computationally infeasible from knowledge of the public key, even though they are necessarily related. Instead, both keys are generated secretly, as an interrelated pair. In public-key cryptosystems, the public key may be freely distributed, while its paired private key must remain secret. The public key is typically used for encryption, while the private or secret key is used for decryption. Diffie and Hellman showed that public-key cryptography was possible by presenting the Diffie-Hellman key exchange protocol. The next year, Ron Rivest, Adi Shamir and Leonard Adleman developed the RSA encryption algorithm at MIT and founded RSA Data Security a few years later in 1982. Later, it became publicly known that asymmetric cryptography had been invented by James H. Ellis at GCHQ, a British intelligence organization and that both the Diffie-Hellman and RSA algorithms had been previously developed in 1970 and were initially called “non-secret encryption.” Apparently Ellis got the idea reading a bell labs paper about encrypting voice communication from World War II. Just to connect some dots here, Alan Turing, who broke the Enigma encryption, visited the proposed author of that paper, Shannon, in 1943. This shouldn't take anything away from Shannon, who was a brilliant mathematical genius in his own right, and got to see Gödel, Einstein, and others at Princeton. Random note: he invented wearables to help people cheat at roulette. Computer nerds have been trying leverage their mad skills to cheat at gambling for a long time. By the way, he also tried to cheat at, er, I mean, program chess very early on, noting that 10 to the 120th power was the game-tree complexity of chess and wrote a paper on it. Of course someone who does those things as a hobby would be widely recognized as the father of informational theory. RSA grew throughout the 80s and 90s and in 1995, they spun off a company called VeriSign, who handled patent agreements for the RSA technology until the patents wore out, er, I mean expired. RSA Security was acquired by EMC Corporation in 2006 for $2.1 billion and was a division of EMC until EMC was acquired by Dell in 2016. They also served as a CA - that business unit was sold in 2010 to Symantec for $1.28B. RSA has made a number of acquisitions and spun other businesses off over the years, helping them get into more biometric encryption options and other businesses. Over time the 56 bit key size of DES was too small and it was followed up by Triple-DES in 1998. And Advanced Encryption Standard, or AES, also in 1998. Diffie-Hellman and RSA, in addition to being the first public examples of high quality public-key cryptosystems have been amongst the most widely used. In addition to encryption, public-key cryptography can be used to implement digital signature schemes. A digital signature is somewhat like an ordinary signature; they have the characteristic that they are easy for a user to produce, but difficult for anyone else to forge. Digital signatures can also be permanently tied to the content of the message being signed as they cannot be moved from one document to another as any attempt will be detectable. In digital signature schemes, there are two algorithms: one for signing, in which a secret key is used to process the message (or a hash of the message or both), and one for verification, in which the matching public key is used with the message to check the validity of the signature. RSA and DSA are two of the most popular digital signature schemes. Digital signatures are central to the operation of public key infrastructures and to many network security schemes (SSL/TLS, many VPNs, etc). Digital signatures provide users with the ability to verify the integrity of the message, thus allowing for non-repudiation of the communication. Public-key algorithms are most often based on the computational complexity of hard problems, often from number theory. The hardness of RSA is related to the integer factorization problem, while Diffie-Hellman and DSA are related to the discrete logarithm problem. More recently, elliptic curve cryptography has developed in which security is based on number theoretic problems involving elliptic curves. Because of the complexity of the underlying problems, most public-key algorithms involve operations such as modular multiplication and exponentiation, which are much more computationally expensive than the techniques used in most block ciphers, especially with typical key sizes. As a result, public-key cryptosystems are commonly hybrid systems, in which a fast symmetric-key encryption algorithm is used for the message itself, while the relevant symmetric key is sent with the message, but encrypted using a public-key algorithm. Hybrid signature schemes are often used, in which a cryptographic hash function is computed, and only the resulting hash is digitally signed. OpenSSL is a software library that most applications use to access the various encryption mechanisms supported by the operating systems. OpenSSL supports Diffie-Hellman and various versions of RSA, MD5, AES, Base, sha, DES, cast and rc. OpenSSL allows you to create ciphers, decrypt information and set the various parameters required to encrypt and decrypt data. There are so many of these algorithms because people break them and then a new person has to come along and invent one and then version it, then add more bits to it, etc. At this point, I personally assume that all encryption systems can be broken. This might mean that the system is broken while encrypting, or the algorithm itself is broken once encrypted. A great example would be an accidental programming mistake allowing a password to be put into the password hint rather than in the password. Most flaws aren't as simple as that. Although Kerckhoffs's principle teaches us that the secrecy of your message should depend on the secrecy of the key, and not on the secrecy of the system used to encrypt the message. Some flaws are with the algorithms themselves, though. At this point most of those are public and security without a password or private key they just take too long to decrypt to be worth anything once decrypted. This doesn't mean we don't encrypt things, it just means that in addition to encryption we now add another factor to that security. But we'll leave the history of two-factor security to another episode. Finally, RSA made a lot of money because they used ciphers that were publicly reviewed and established as a standard. Public review of various technological innovations allows for commentary and making it better. Today, you can trust most encryption systems because due to that process, it costs more to decrypt what you're sending over the wire than what is being sent is worth. In other words, collaboration trumps secrecy.