Podcasts about stealthbits technologies

  • 9PODCASTS
  • 12EPISODES
  • 31mAVG DURATION
  • ?INFREQUENT EPISODES
  • Apr 27, 2021LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about stealthbits technologies

Latest podcast episodes about stealthbits technologies

Negotiate With I.T.
Episode 45 - Privacy and Security Controls with Gabe Gumbs

Negotiate With I.T.

Play Episode Listen Later Apr 27, 2021 24:57


From solutions architecture to security, Gabe Gumbs brings wide and deep technical experience to his position as Chief Innovation Officer at Spirion. Today, he is leading the Spirion product team through strategic product development to create technologies that push data security forward in an increasingly complex digital world. Prior to his new position at Spirion, Gabe held a range of positions in security technology, including VP of Product Management at Spirion. Other prior positions include VP of Product Strategy at STEALTHbits Technologies, and Director of Research and Products at WhiteHat Security. Gabe also served on the Board of Advisors at eGRC.com.Show Notes:[01:16] Gabe shares his career journey and how he got into IT. His interest in technology actually began in high school.  [02:39] He started his IT career as a junior network admin.  About ten years ago he switched from the practitioner side to the solution provider side.  So now he builds security technologies and that is the core of what he focused on.[04:25] Chief Innovation Officer means that he sits at the head of their project strategy.  He ensures they are bringing the market the right technologies to solve their customers problems.  [05:52] They spend a lot of time understanding and examining the customer’s problem well before jumping to the solution. [06:46] He spends a lot of time digging into the problems themselves with the customer. [07:11] For the most part, your average customer understands that they are not so unique that their problems would stand out from others. [07:55] When organizations are taking very differentiated approaches to solving their own problems where they might run into unique challenges of their own.  [09:24] Privacy operations is going to become a very necessary function inside of any organization with any sizable amount of data.  [11:25] It is especially difficult when the internal business doesn't understand where all the data exists in multiple clouds. [12:57] You can have security without privacy.  On the security side you are dealing with risks that arise from unauthorized access to data.  On the privacy side you are dealing risks that arise from authorized access data. [13:37] The expectation of privacy is a bit overstated in the corporate world.  [14:38] Where is all your data and what type of data is it?[15:50] If that is data that you’re required to share with a third party, that is going to require different security and privacy controls.  [16:14] We have to link the business use of the data to the security and privacy controls.  [16:35] Align business use of the data with the data type. [17:01] Did I genuinely understand that problem and am I approaching it the right way? [17:56] The non malicious threats continue to surprise them in different ways. Underestimating human ingenuity will always get us in trouble.  [19:03] It helps to visualize the problem.   [19:51] Gabe shares his best worst boss story. [20:47] It is important to understand how the business operates and then understanding how you are going to secure the business. [22:26] Gabe’s advice is to slow down. Sometimes you have to slow down to speed up. [23:46] Spend more time in the problem space even in your personal life.  When we are under pressure we tend to want to run towards solving it, but being uncomfortable for just a little bit longer so you can understand that problem is really where we need to be. Links and Resources:State of the CIO Podcast WebsiteState of the CIO Podcast on Apple PodcastsDan on LinkedInGabe on LinkedInGabe on TwitterSpirionPrivacy Please Podcast

Hashtag Realtalk with Aaron Bregg
Episode 19 - Privilege Access Management for Small and Medium Business

Hashtag Realtalk with Aaron Bregg

Play Episode Listen Later Sep 30, 2020 43:15


In this episode I speak with Martin Cannard about Privilege Access Management for Small and Medium Business. Martin is the Vice President of Product Strategy for STEALTHbits Technologies. Here are some of the questions that we tackled in this session: What is Privileged Access Management and why do you need it?Why is PAM so 'scary'?What the biggest problems that you are seeing in the PAM space?What is wrong with a typical PAM boilerplate? This episode is sponsored by STEALTHbits and, as always, proceeds from this sponsorship will go toward At Risk students in West Michigan.Support the show (https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=BPUXUJ8SWLCR6&source=url)

Compliance and Coronavirus
Gabe Gumbs on Data Privacy and Data Protection Going Forward

Compliance and Coronavirus

Play Episode Listen Later Jun 17, 2020 13:43


Welcome to the newest addition to the Compliance Podcast Network, Compliance and Coronavirus. In this episode, I am joined by Gabe Gumbs. Gabe is the Chief Innovation Officer at Spirion. He leads the Spirion product team through strategic product development to create technologies that push data security forward in an increasingly complex digital world. Prior to his new position at Spirion, Gumbs held a range of positions in security technology, including VP of Product Management at Spirion. Other prior positions include VP of Product Strategy at STEALTHbits Technologies, and Director of Research and Products at WhiteHat Security. Gumbs also served on the Board of Advisors at eGRC.com.  In this episode, we consider some of the challenges around data in the age of Coronavirus. Gabe discusses some of the top questions he and his team are hearing from customers during this time of Coronavirus and economic dislocation around data privacy and data protection during the economic dislocation. Gabe observes that trends which were in play have been largely amplified as a result of Covid-19 and the attendant economic dislocation increased trends in cybersecurity compliance. We conclude with a discussion of Spirion's Data Discovery Agent and it can assist companies at this point in time and into Q3 and Q4. For more information on Spirion, check out their website here. Check out Spirion’s Data Discovery Agent, here.

ITSPmagazine | Technology. Cybersecurity. Society
Reinventing Privileged Access Management | A Dialogue With Martin Cannard, VP, STEALTHbits

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Oct 2, 2019 42:23


A Their Story interview with Sean Martin Today’s guest is Martin Cannard, Vice President, Product Strategy (Privileged Access Management) at STEALTHbits Technologies. Martin and I look at the past to explore how the world of access control and privileged access management (PAM) has changed, mainly driven mobile, cloud, and the Internet of Things. Martin shares some stories about how organizations are changing the way they define and implement privileged access management solutions, turning the technology—and their operational infrastructure—on its side business to better support business requirements without opening up the gates too wide nor closing them down too much. Ultimately, it’s about finding that “just right” access model that accounts for changes in risk, threat, context. This isn’t an easy task when faced with growing technical complexities, increasingly-demanding business processes, and the need to scale to meet both market and end-user demands. These are some of the points Martin and I discuss during our chat: - Why do we need another (new or different or otherwise) PAM offering? - Where does the current PAM market sit and what’s the back story leading us to this point? - What is fundamentally different from the new way of thinking about PAM solutions? - How do changes in endpoints, servers, applications, VMs, cloud, and mobility change the way organizations deal with access? - It’s easy to open up everything and fail open, risking the loss of authorized access to critical systems and data /// it’s equally easy to lock everything down and risk the loss of business and revenue — how can you fail-safe in most situations while easily managing exceptions at scale? - What elements are required to succeed with a reinvented PAM solution—technology, infrastructure, processes, and team? - What visibility is required to ensure policies and related enforcement rules are working properly? - and so much more… After you listen to this story by STEALTHbits, check to see if your perception of privileged access management has changed—and, if so, how. Learn more about STEALTHbits on ITSPmagazine: www.itspmagazine.com/company-directory/stealthbits

ITSPmagazine | Technology. Cybersecurity. Society
Businesses Are Talking About Technology. But Are They Tech Savvy Yet?

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Apr 2, 2019 10:37


During RSA Conference 2019 in San Francisco, Sean Martin sat down with Rod Simmons, Vice President of Product Strategy for Active Directory at STEALTHbits Technologies, to get his thoughts and insights into the current state of the Identity and Access Management space through the lens of both the conference sessions and sprawling expo hall(s). These are some of the topics discussed: The conversations that InfoSec practitioners are having are very insightful. There’s a lot of thought going into cybersecurity, but Rod — and their guest presenter in their booth, Paula Januszkiewicz, CEO of CQURE — finds that while some people understand what’s going on, others still find it hard to grasp the challenges and methods required to address those problems at the technical level. There’s work to do here. Third-party risk management seemed to be a hot topic discussed by both vendors and practitioners. It’s becoming more and more clear that third-party partners are a threat conduit into an organization — even if the organization itself seems to have their own act in order. The cloud continues to be a topic of discussion, but Rod doesn’t see mass migrations of workloads to the cloud. A common mantra “we can still do it cheaper on prem” is one that Rod has heard on many occasions. In the cases where some small workloads are being moved, it’s because of the operational security benefits they get from the move, and not the finance end of things. User behavior analytics is also a topic of interest for many in this space. It seems that the industry has done a good job raising awareness for the need to move beyond static rule sets though “UBA and Machine Learning” checkboxes included in pretty much every RFI (request for information). However, customers are becoming more savvy and are now looking beyond the checkbox to put vendors on the spot, asking questions such as “How does your ML work?”, “Can you describe the models you’ve built?” and “How did you build those models?”

Minds On B2B
Episode 06: What is SEO and Why is SEO Important?

Minds On B2B

Play Episode Listen Later Mar 19, 2019 19:51


GUEST BIO: Ralph Marino SEO Specialist STEALTHbits Technologies Ralph Marino is an SEO Specialist with 6+ years of proven experience in marketing and has accomplished measurable results while leading marketing efforts in a dynamic, ever changing, digital environment. Ralph has extensive knowledge in SEO, social media, marketing campaigns, and brand building & governance however his passion is with Search Engine Optimization. He previously worked for Colorado’s largest digital marketing agency managing a portfolio of well-known brands and businesses SEO campaigns. Ralph transitioned out of the agency life and now works in-house as an SEO specialist for STEALTHbits Technologies, a leading provider of data security solutions, helping organizations protect their most critical assets against today’s greatest threats. Connect on LinkedIn: https://www.linkedin.com/in/ralphmarino/ Visit STEALTHbits website:https://www.stealthbits.com/ EPISODE DESCRIPTION: In today's episode, we'll be talking and learning about search engine optimization, and over the course of this year, we're gonna dedicate multiple episodes to this topic because that's how important it is in today's searchable world. In this first episode we'll define what SEO is, why it's important, and we'll probably even find a way to talk about pizza.

Paul's Security Weekly TV
Gabriel Gumbs, STEALTHbits - Enterprise Security Weekly #97

Paul's Security Weekly TV

Play Episode Listen Later Jun 29, 2018 33:45


Gabriel Gumbs is the VP of Product Strategy at STEALTHbits Technologies. With a 16 year tenure in CyberSecurity, he has spent more than a decade of that as a security practitioner at companies like Pfizer before moving into the B2B Security space in 2011 with WhiteHat Security. Full Show Notes: https://wiki.securityweekly.com/ES_Episode97 Visit http://securityweekly.com/esw for all the latest episodes!

interview cybersecurity pfizer product strategy whitehat security enterprise security weekly gabriel gumbs stealthbits stealthbits technologies
Enterprise Security Weekly (Video)
Gabriel Gumbs, STEALTHbits - Enterprise Security Weekly #97

Enterprise Security Weekly (Video)

Play Episode Listen Later Jun 28, 2018 33:45


Gabriel Gumbs is the VP of Product Strategy at STEALTHbits Technologies. With a 16 year tenure in CyberSecurity, he has spent more than a decade of that as a security practitioner at companies like Pfizer before moving into the B2B Security space in 2011 with WhiteHat Security. Full Show Notes: https://wiki.securityweekly.com/ES_Episode97 Visit http://securityweekly.com/esw for all the latest episodes!

interview cybersecurity pfizer product strategy whitehat security enterprise security weekly gabriel gumbs stealthbits stealthbits technologies
Computer America
STEALTHbits Technologies Interview, Smart Tupperware, RED's 8K Camera, Zuckerber

Computer America

Play Episode Listen Later May 22, 2018 61:00


First Segment: STEALTHbits Technologies. Gabriel Gumbs, VP of Product Strategy. STEALTHbits Technologies is a cybersecurity software company focused on protecting an organization’s credentials and data. By removing inappropriate data access, enforcing security policy, and detecting advanced threats, we reduce security risk, fulfill compliance requirements and decrease operations expense.   Second Segment: Computer and Technology News. Today's Topics Include: Oregon City To Offer Gigabit Broadband Amazon Is Selling Facial Recognition Tech To Law Enforcement US Will Help Save ZTE Smart Tupperware And more! For full show notes, check out ComputerAmerica.com!

Paul's Security Weekly TV
Gabriel Gumbs, STEALTHbits - Enterprise Security Weekly #40

Paul's Security Weekly TV

Play Episode Listen Later Apr 16, 2017 27:04


Gabriel Gumbs is the VP of Product Strategy at STEALTHbits Technologies. With a 16-year tenure in cybersecurity, Gabriel spent more than a decade as a security practitioner at companies like Pfizer before moving into the B2B Security space in 2011 with WhiteHat Security. Full Show Notes: http://wiki.securityweekly.com/wiki/index.php/ES_Episode40 Visit http://securityweekly.com/esw for all the latest episodes!

interview man news security enterprise pfizer hacking product strategy whitehat security asadoorian enterprise security weekly gabriel gumbs stealthbits stealthbits technologies es episode40 visit
Enterprise Security Weekly (Video)
Gabriel Gumbs, STEALTHbits - Enterprise Security Weekly #40

Enterprise Security Weekly (Video)

Play Episode Listen Later Apr 14, 2017 27:04


Gabriel Gumbs is the VP of Product Strategy at STEALTHbits Technologies. With a 16-year tenure in cybersecurity, Gabriel spent more than a decade as a security practitioner at companies like Pfizer before moving into the B2B Security space in 2011 with WhiteHat Security. Full Show Notes: http://wiki.securityweekly.com/wiki/index.php/ES_Episode40 Visit http://securityweekly.com/esw for all the latest episodes!

interview man news security enterprise pfizer hacking product strategy whitehat security asadoorian enterprise security weekly gabriel gumbs stealthbits stealthbits technologies es episode40 visit
Healthcare Tech Talk- Exploring how technology can help meet the challenges in Healthcare.
HTT 58- Ransomware hits multiple Healthcare organizations, are you prepared?

Healthcare Tech Talk- Exploring how technology can help meet the challenges in Healthcare.

Play Episode Listen Later Apr 6, 2016 41:03


A string of recent, highly publicized "Ransomware" attacks have many healthcare organizations and their vendors scrambling to protect themselves and spurred the FBI to publish a Flash Alert. These attacks are a fairly new paradigm for hospitals after years of protecting themselves from the theft of patient information, hospitals now must worry about the encryption and potential destruction of their data. These attacks seem to be cruder and easier to carry out, but could be even more disruptive and damaging to a healthcare organization. Today we talk with two experts about how organizations can begin taking the fundamental steps required to protect themselves. Brad Taylor is CEO of Proficio, a leading Managed Security Services Provider. He has 20+ years’ experience in creating services that safeguard enterprise networks against cyber threats, with strong focus on healthcare environments and highly regulated industries.  Adam Laub, Senior Vice President, Product Marketing, STEALTHbits Technologies. He is responsible for setting product strategy, defining future roadmap, driving strategic sales engagements, supporting demand generation activities, enabling the sales organization and all aspects of product evangelism.    Please give us a 5 star review in iTunes, Stitcher, or Tunein if you appreciate the show! Visit us at www.HealthcareTechTalk.net Twitter https://twitter.com/Healthtechtalkn LinkedIn https://www.linkedin.com/company/healthcare-tech-talk?trk=biz-companies-cym Facebook: https://www.facebook.com/pages/Healthcare-Tech-Talk/711048778947195