Enterprise Software Defenders features exclusive conversations with the world's best security executives, who share how threat landscapes have changed due to the cloud and AI’s role in the future of cybersecurity. ESD is hosted by Evan Reiser, the CEO & founder of Abnormal Security, and Mike Britton, the CISO of Abnormal Security.
…
continue reading
Enterprise Software Innovators features exclusive conversations with the world's best technology executives, who share how AI and other innovative technologies transform enterprise organizations. ESI is hosted by Evan Reiser, the CEO & founder of Abnormal Security, and Saam Motamedi, a general partner at Greylock Partners.
…
continue reading
Abnormal Engineering Stories explores what it's like leading engineering teams and systems featuring tech industry leaders with real world, hands-on operating experience. Hosted by Kevin Wang, Head of Engineering at Abnormal Security. Abnormal Security is defining the next generation of email security defense. Our platform uses machine learning and artificial intelligence to baseline communication content, user identity, and behavioral signals in real-time and at-scale in order to detect the ...
…
continue reading
In this EM360 podcast, we investigate the cutting edge Cybersecurity issues that organisations are facing today. These discussions are led by the organisations at the forefront of defence as they walk us through the issues people are facing and how to effectively implement prevention strategies.
…
continue reading
ThinkTech Hawaii is a non-profit streaming network based in Honolulu. Our vision is to be a leader in shaping a more vital and thriving Hawaii as the foundation for future generations. Our mission is to be the leading digital media platform raising public awareness and promoting civic engagement in Hawaii. Visit thinktechhawaii.com or youtube.com/thinktechhawaii to watch our live stream
…
continue reading
1
Enlightening the Future of AI and Photonics with Excelitas Technologies EVP & CIO Amit Shah
31:14
31:14
Play later
Play later
Lists
Like
Liked
31:14
On the 42nd episode of Enterprise Software Innovators, host Evan Reiser (Abnormal Security) talks with Amit Shah, EVP & CIO of Excelitas Technologies. Excelitas is a global technology company specializing in generating and sensing light in photonics. In this conversation, Amit shares insights into how Excelitas utilizes AI to enhance its photonic t…
…
continue reading
1
Palo Alto Networks: Bridging the Gap between Cloud Security and the SOC
32:31
32:31
Play later
Play later
Lists
Like
Liked
32:31
Integration and communication between Cloud Security and the Security Operations Center (SOC) is now a top priority for effective security. Cloud Security teams focus on securing cloud infrastructure, managing identity and access, and ensuring data protection, while SOC teams monitor, detect, and respond to threats in real time. Effective collabora…
…
continue reading
1
Preventing Account Takeovers in Cloud Applications
23:25
23:25
Play later
Play later
Lists
Like
Liked
23:25
Recent research shows that 86% of security leaders today do not have the tools they need to effectively prevent account takeovers. Organizations today are using more cloud applications than ever, and with the interconnected nature of the cloud, entry into one application can result in lateral movement to others—making the time to a breach faster th…
…
continue reading
1
Tackling AI Offense and Defense with The National Football League CISO Tomás Maldonado
28:53
28:53
Play later
Play later
Lists
Like
Liked
28:53
On the 15th episode of Enterprise Software Defenders, hosts Evan Reiser and Mike Britton, both executives at Abnormal Security, talk with Tomás Maldonado, Chief Information Security Officer at The National Football League. The NFL, comprising 32 franchises, is the world's most valuable sporting league, with over 20 billion dollars in annual revenu…
…
continue reading
1
Guardz: Empower MSPs to Secure & Insure Small Businesses
19:53
19:53
Play later
Play later
Lists
Like
Liked
19:53
Today, small businesses face significant challenges. Limited resources, tight budgets, time constraints, and inadequate training often leave them vulnerable. Hackers quickly exploit these weaknesses, targeting small and medium-sized businesses (SMBs) with sophisticated threats. Managed Service Providers (MSPs) are tasked with the daunting responsib…
…
continue reading
1
Trends and Threats: Rapid7's 2024 Cybersecurity Findings
13:49
13:49
Play later
Play later
Lists
Like
Liked
13:49
The 2024 Attack Intelligence Report thoroughly analyses the latest trends, tactics, and techniques used by cyber adversaries. This year's report highlights a significant increase in sophisticated attacks, including advanced persistent threats (APTs) and highly targeted ransomware campaigns. By leveraging the MITRE ATT&CK framework, the report offer…
…
continue reading
1
Trend Micro: How to Facilitate Difficult Discussions with C-Level Executives
20:38
20:38
Play later
Play later
Lists
Like
Liked
20:38
As artificial intelligence (AI) becomes increasingly integral to business operations, enterprises face new risks from Shadow AI—unauthorised or unmanaged AI tools and projects that bypass standard security protocols. The potential consequences of Shadow AI are severe, introducing vulnerabilities, compromising data integrity, and leading to complian…
…
continue reading
Security Operations Center (SOC) analysts are the backbone of organisations' defence against cyber threats. However, the high-pressure environment, constant vigilance, and demanding workload can lead to serious burnout. This condition not only hampers analysts' performance and job satisfaction but also poses a threat to overall security. Organisati…
…
continue reading
1
Transforming Retail Through AI with Former Giant Eagle EVP & CIO Kirk Ball
28:15
28:15
Play later
Play later
Lists
Like
Liked
28:15
On the 41st episode of Enterprise Software Innovators, hosts Evan Reiser (Abnormal Security) and Saam Motamedi (Greylock Partners) talk with Kirk Ball, former EVP & CIO of Giant Eagle. Giant Eagle is one of the largest regional supermarket chains in the United States, with over 37,000 employees and more than $11 billion in annual revenue. In this c…
…
continue reading
1
Abnormal Security: Protecting Human Vulnerabilities with Human Behavior AI
22:47
22:47
Play later
Play later
Lists
Like
Liked
22:47
The most dangerous cyber attacks today have one thing in common: they target humans rather than systems. Social engineering has been a prevalent tactic for years, with a known $51B in exposed losses over the last decade. Unfortunately, these numbers will continue to rise with the proliferation of AI, and your email inboxes are your most likely targ…
…
continue reading
1
Examining the AI Paradox with Ingersoll Rand CISO Noah Davis
30:35
30:35
Play later
Play later
Lists
Like
Liked
30:35
On the 14th episode of Enterprise Software Defenders, hosts Evan Reiser and Mike Britton, both executives at Abnormal Security, talk with Noah Davis, Vice President & Chief Information Security Officer at Ingersoll Rand. Ingersoll Rand is a Fortune 500 global industrial manufacturing company with over 18,000 employees and 7 billion dollars of annua…
…
continue reading
1
Bots Unleashed: How ChatGPT's Insights Fuel Automated Manipulation
19:32
19:32
Play later
Play later
Lists
Like
Liked
19:32
Hackers use AI tools like ChatGPT to enhance their operations and manipulate large language models. They infiltrate and attack GPT by manipulating the knowledge base through coordinated bot activity. These sophisticated cybercriminals are not just using AI tools, they are leveraging them to streamline their attacks. By exploiting the model's natura…
…
continue reading
1
Palo Alto Networks: The State of SOC Platformization
30:59
30:59
Play later
Play later
Lists
Like
Liked
30:59
The trend of platformization in the Security Operations Centre (SOC) is a game-changer in the cybersecurity landscape. It offers a holistic approach to managing and mitigating security threats. By consolidating various security tools, processes, and data sources into a unified platform, organizations can streamline operations, reduce complexity, an…
…
continue reading
1
HID Global: Leading Through Challenges of Hospital Worker Violence
26:34
26:34
Play later
Play later
Lists
Like
Liked
26:34
The alarming rate of violence against healthcare workers underscores the urgent need for comprehensive security measures within medical facilities. As incidents continue to rise, it's imperative that proactive strategies are employed to safeguard the well-being of patients, visitors and staff. In this episode of the EM360 Podcast, Paulina Rios Maya…
…
continue reading
1
The Role of Generative AI in Red Canary's Security Evolution
21:20
21:20
Play later
Play later
Lists
Like
Liked
21:20
GenAI has revolutionized the landscape of information security. Once reserved for experts and Ph. D.s, it is now accessible to a broader spectrum of practitioners and engineers. Its applications span from summarising data to tailoring reports, amplifying incident response, and profiling user behaviours. By harnessing the power of generative AI, sec…
…
continue reading
1
Supercharging Enterprise Operations with AI with Lexmark Global CTO & CIO Vishal Gupta
25:24
25:24
Play later
Play later
Lists
Like
Liked
25:24
On the 40th episode of Enterprise Software Innovators, hosts Evan Reiser (Abnormal Security) and Saam Motamedi (Greylock Partners) talk with Vishal Gupta, Global CTO & CIO of Lexmark. With over 9,000 employees in 170 countries, Lexmark is a global technology company specializing in printing solutions and cloud-enabled IoT imaging technology. In thi…
…
continue reading
1
Elevating Cyber Defense Through AI with Avery Dennison VP & ISO Jeremy Smith
29:10
29:10
Play later
Play later
Lists
Like
Liked
29:10
On the 13th episode of Enterprise Software Defenders, hosts Evan Reiser and Mike Britton, both executives at Abnormal Security, talk with Jeremy Smith, Vice President and Information Security Officer at Avery Dennison. Avery Dennison is a multinational materials science company with over 34,000 employees and over $8 billion in annual revenue. They …
…
continue reading
1
Empowering Teams Through AI Skills Enablement with LexisNexis Chief Information Officer Reena Tiwari
25:26
25:26
Play later
Play later
Lists
Like
Liked
25:26
On the 39th episode of Enterprise Software Innovators, host Evan Reiser (Abnormal Security) talks with Reena Tiwari, Chief Information Officer of LexisNexis. With over 10,000 employees in over 160 countries, LexisNexis is the global leader in tooling and resources for legal research, boasting the world’s largest database for legal and public record…
…
continue reading
1
Cyera: The Future of Data Security in the Age of Artificial Intelligence
19:06
19:06
Play later
Play later
Lists
Like
Liked
19:06
The sheer volume and diversity of data available to organisations today offer numerous opportunities for innovation, efficiency gains, and informed decision-making. However, this abundance of data also brings with it formidable challenges, particularly concerning privacy, security, and ethical considerations. Data is often described as new oil, so …
…
continue reading
1
AI and the Future of Insurance with Travelers EVP and Chief Technology & Operations Officer Mojgan Lefebvre
23:49
23:49
Play later
Play later
Lists
Like
Liked
23:49
On the 38th episode of Enterprise Software Innovators, hosts Evan Reiser (Abnormal Security) and Saam Motamedi (Greylock Partners) talk with Mojgan Lefebvre, EVP and Chief Technology & Operations Officer of Travelers. Travelers is a Fortune 500 insurance company offering a range of insurance products to customers across the globe. With over $41 bil…
…
continue reading
1
Beyond the Firewall: How Censornet Secures the Modern Enterprise
27:18
27:18
Play later
Play later
Lists
Like
Liked
27:18
Gone are the days of merely safeguarding school computers! Censornet, a rising star in the tech industry, has undergone a remarkable transformation. From its roots as an internet security provider for educators, it has emerged as a trailblazing force in digital risk management. Today, Censornet offers a comprehensive suite of tools designed to conf…
…
continue reading
1
Palo Alto Networks: Optimising Managed Detection and Response (MDR) with Automation
14:28
14:28
Play later
Play later
Lists
Like
Liked
14:28
Amid the ever-evolving landscape of cyber threats, organisations are constantly challenged to ensure security. Conventional security methods are failing to keep up with the escalating volume and sophistication of attacks. By implementing Managed Detection and Response (MDR) with automation, Security Operations Centers (SOCs) can optimise workflows,…
…
continue reading
1
Empowering Your Enterprise Through Generative AI with Asana CIO Saket Srivastava
28:25
28:25
Play later
Play later
Lists
Like
Liked
28:25
On the 37th episode of Enterprise Software Innovators, hosts Evan Reiser (Abnormal Security) and Saam Motamedi (Greylock Partners) talk with Saket Srivastava, CIO of Asana. Asana is a leader in project management platforms, allowing teams to stay organized, communicate effectively, and achieve their project goals efficiently. Asana has more than 13…
…
continue reading
1
Appdome: Understanding the Impact of SolarWinds on DevSecOps Practices
28:57
28:57
Play later
Play later
Lists
Like
Liked
28:57
The SolarWinds breach exposed vulnerabilities within DevSecOps practices, sending shockwaves through the tech world. The U.S. Securities and Exchange Commission (SEC) indictment against SolarWinds further emphasised the gravity of the situation, alleging the company misled investors by failing to disclose these vulnerabilities and the subsequent br…
…
continue reading
1
Radware: Why You Need Advanced Threat Intelligence
25:49
25:49
Play later
Play later
Lists
Like
Liked
25:49
The fight against cybercrime is a never-ending battle. Firewalls and antivirus software, our traditional defences, are like trusty shields—good against basic attacks but not enough. Advanced attackers can slip through the cracks, exploiting new weaknesses or mimicking harmless traffic. Thus, businesses are exposed and face potential data breaches, …
…
continue reading
1
Risky Business: Navigating Enterprise Cloud Complexities with Evolven's CEO
30:26
30:26
Play later
Play later
Lists
Like
Liked
30:26
The cloud revolutionised how businesses operate, but managing dynamic, complex environments presents new and unique challenges. While digital transformation has brought significant benefits, the reality is that organisations now require innovative solutions to effectively navigate intricate, hybrid, multi-cloud environments. Evolven Software, drive…
…
continue reading
1
Leveraging AI to Transform the Future of Global Logistics with FedEx EVP & CIO Rob Carter
29:53
29:53
Play later
Play later
Lists
Like
Liked
29:53
On the 36th episode of Enterprise Software Innovators, hosts Evan Reiser (Abnormal Security) and Saam Motamedi (Greylock Partners) talk with Rob Carter, EVP & CIO of FedEx. FedEx is a multinational courier delivery services company with over $90 billion in annual revenue and is the fifth largest employer in the US, with more than 500,000 workers gl…
…
continue reading
1
The Road Ahead: Pioneering the Future of Mobility with Goodyear SVP of Global Operations and CTO Chris Helsel
30:56
30:56
Play later
Play later
Lists
Like
Liked
30:56
On the 35th episode of Enterprise Software Innovators, hosts Evan Reiser (Abnormal Security) and Saam Motamedi (Greylock Partners) talk with Chris Helsel, SVP of Global Operations and CTO of The Goodyear Tire & Rubber Company. Goodyear is a leading vehicle equipment manufacturer known for producing tires and rubber products for diverse applications…
…
continue reading
1
Pentera: Automated Security Validation and Empowering Pen Testing Teams
17:39
17:39
Play later
Play later
Lists
Like
Liked
17:39
Automated Security Validation. Involving tools, scripts and platforms to emulate true-to-life attacks, Automated Security Validation is a key part of assessing the readiness of the security infrastructure and guiding prioritized remediation. But how does this implementation of automation really work to empower human expertise? How does all of this …
…
continue reading
1
How to Train Your Generative AI with Priceline CTO Marty Brodbeck
32:17
32:17
Play later
Play later
Lists
Like
Liked
32:17
On the 34th episode of Enterprise Software Innovators, host Evan Reiser (Abnormal Security) talks with Marty Brodbeck, CTO of Priceline. Priceline is an online travel agency that enables users to book hotels, flights, and rental cars across 400 airlines and 300,000 hotels in over 200 countries worldwide. Marty shares thoughts on organizational fram…
…
continue reading
It seems like VPN products are consistently the initial access vectors for ransomware groups and targetted attacks. This was demonstrated in the recent Ivanti Connect Secure zero-day vulnerabilities, as well as Cisco when they admitted last year that Akira Ransomware was specifically targeting their VPNs. But what is the real problem with VPNs - an…
…
continue reading
1
Navigating the Speed of Security Evolution in Global Enterprises with Associated British Foods CISO Lynton Oelofsen
26:45
26:45
Play later
Play later
Lists
Like
Liked
26:45
On the 12th episode of Enterprise Software Defenders, hosts Evan Reiser and Mike Britton, both executives at Abnormal Security, talk with Lynton Oelofsen, Chief Information Security Officer at Associated British Foods. ABF is a multinational food processing and retail conglomerate with 132,000 employees and over 21 billion dollars in annual revenue…
…
continue reading
1
Palo Alto Networks: The Role of Automation in Rapid Breach Response Open configuration options
19:01
19:01
Play later
Play later
Lists
Like
Liked
19:01
Rapid breach response. The art of quickly reacting to a security breach or incident. Key for minimising the impact of attacks and ensuring your team is as effective as possible, rapid breach response is an important part of any security strategy. With the rise and innovation we see in the automation space right now, how could automation be implemen…
…
continue reading
1
Thoropass: Fixing the Broken Audit Process
15:27
15:27
Play later
Play later
Lists
Like
Liked
15:27
The audit process is broken. CISOs and CTOs have faced a multitude of challenges under this outdated audit landscape, and the efficacy of companies are being stunted by a system that desperately needs updating. But how can technology be leveraged to streamline or even transform that auditing process? And what does the future of infosecurity complia…
…
continue reading
1
CloudSEK: The Future of Software Supply Chain Security
14:10
14:10
Play later
Play later
Lists
Like
Liked
14:10
In the world of complex supply chains, it’s not enough to secure our own data but also ensuring that third party vendors we work with have robust security. When it comes to proactively stopping threats and mitigating issues, supply chain monitoring and ensuring a secure software supply chain is crucial to keep organizations’ data safe. In this epis…
…
continue reading
1
Insights on AI Integration and Operational Evolution with Former Abbott CISO Betsy Wille
37:21
37:21
Play later
Play later
Lists
Like
Liked
37:21
On the 11th episode of Enterprise Software Defenders, host Evan Reiser (Abnormal Security) and special guest host Steve Ward (Former CISO at The Home Depot and TIAA) talk with Betsy Wille, former CISO at Abbott. Abbott is a Fortune 100 global healthcare company that manufactures various healthcare products, including diagnostics, pharmaceuticals, a…
…
continue reading
1
Radware: Moving From Responsive Protection to Proactive Protection
18:20
18:20
Play later
Play later
Lists
Like
Liked
18:20
In 2024, the conventional approach of responding to threats is dead. As cyberspace becomes more complex, interconnected, and sophisticated, companies are beginning to recognise the shift from a reactive stance to a proactive one. This shift isn’t just a technological upgrade - it’s a fundamental change in mindset that can cause ripples throughout t…
…
continue reading
1
Understanding AI and Customer Success with Gainsight CIO Karl Mosgofian
28:45
28:45
Play later
Play later
Lists
Like
Liked
28:45
On the 33rd episode of Enterprise Software Innovators, hosts Evan Reiser (Abnormal Security) and Saam Motamedi (Greylock Partners) talk with Karl Mosgofian, CIO of Gainsight. Gainsight is an industry-leading customer success platform used by enterprise organizations to optimize the customer journey from beginning to end. In this conversation, Karl …
…
continue reading
1
Revolutionizing Business Operations With AI and Automation with PagerDuty CIO Eric Johnson
27:31
27:31
Play later
Play later
Lists
Like
Liked
27:31
On the 32nd episode of Enterprise Software Innovators, hosts Evan Reiser (Abnormal Security) and Saam Motamedi (Greylock Partners) talk with Eric Johnson, CIO at PagerDuty, the digital operations management platform. Eric is a longtime technology leader and has been the CIO at many notable companies throughout his career, including Informatica, Doc…
…
continue reading
1
AI and the Future of Protecting Hospitality with Choice Hotels CISO Jason Stead
25:29
25:29
Play later
Play later
Lists
Like
Liked
25:29
On the 10th episode of Enterprise Software Defenders, hosts Evan Reiser and Mike Britton, both executives at Abnormal Security, talk with Jason Stead, Chief Information Security Officer at Choice Hotels International. Choice Hotels is a global hospitality company with over 7,400 hotels worldwide and over $1.4 billion in annual revenue. In this conv…
…
continue reading
1
Palo Alto Networks: Using Threat Intelligence Effectively in Incident Investigation
21:57
21:57
Play later
Play later
Lists
Like
Liked
21:57
Using threat intelligence effectively in incident investigation is crucial for identifying, mitigating, and preventing cybersecurity threats. By integrating relevant threat intelligence feeds, security teams gain insights into the tactics, techniques, and procedures employed by malicious actors. This aids in swift detection and response to potentia…
…
continue reading
1
Unlocking Immersive Realities Through AI with Matterport CIO Pranab Sinha
23:11
23:11
Play later
Play later
Lists
Like
Liked
23:11
On the 31st episode of Enterprise Software Innovators, hosts Evan Reiser (Abnormal Security) and Saam Motamedi (Greylock Partners) talk with Pranab Sinha, CIO of Matterport. Matterport is a next-generation virtual modeling tool that uses 3D-scanning technology and machine learning to create immersive digital replicas of physical spaces. In this con…
…
continue reading
1
Evolving Impacts of AI on Security with Markel CISO and Chief Privacy Officer Patti Titus
27:27
27:27
Play later
Play later
Lists
Like
Liked
27:27
On the 9th episode of Enterprise Software Defenders, hosts Evan Reiser and Mike Britton, both executives at Abnormal Security, talk with Patti Titus, chief privacy and information security officer at Markel. Markel is the insurance wing of Markel Group, a global insurance and investment company with over 17,000 employees and $12 billion in annual r…
…
continue reading
1
Radware: 360 Application Protection and Why Companies Need It
36:50
36:50
Play later
Play later
Lists
Like
Liked
36:50
Application security is a complex, wide-ranging field. With attackers using a wide range of attacks from credential stuffing to cookie poisoning, how can you keep up with the ever-evolving landscape? In this episode of the EM360 Podcast, Analyst Jonathan Care speaks to Uri Dorot, Senior Product Marketing Manager at Radware, to discuss: Main challen…
…
continue reading
1
Huntress: Doing More With Less in Your Cybersecurity Strategy
15:28
15:28
Play later
Play later
Lists
Like
Liked
15:28
Doing more with less. The art of optimising your cybersecurity strategy and resources to achieve effective protection against cyber threats. From assessing and prioritising assets to utilising open source tools, understaffed and overstretched cybersecurity teams are looking at ways to maximise what they’re able to do. In this episode of the EM360 P…
…
continue reading
1
Savvy: SaaS Identity Discovery and Visibility
23:48
23:48
Play later
Play later
Lists
Like
Liked
23:48
Securing Software as a Service (SaaS) applications is crucial to protect sensitive data, ensure user privacy, and maintain the overall integrity of the service. From data encryption and identity management to network security and a solid incident response plan, there are some crucial things to consider when employing SaaS as a part of your workflow…
…
continue reading
1
Cyera: Why Data Defence is so Difficult in the TikTok Era
21:29
21:29
Play later
Play later
Lists
Like
Liked
21:29
Enabling the business to leverage data while preventing breaches are top priorities for CxOs and boards across industries. However, data security has long relied on legacy architectures and outdated approaches that were developed to protect data on-premises. By harnessing artificial intelligence and machine learning to automatically learn and holis…
…
continue reading
1
Technology Innovations in the Clothing Industry with Former H&M CTO Alan Boehme
26:40
26:40
Play later
Play later
Lists
Like
Liked
26:40
On the 30th episode of Enterprise Software Innovators, hosts Evan Reiser (Abnormal Security) and Saam Motamedi (Greylock Partners) talk with Alan Boehme, Former CTO at H&M, Procter & Gamble, and former CIO at The Coca-Cola Company. For over 20 years, Alan has led technology teams at some of the world’s most recognizable brands. He has a wealth of i…
…
continue reading
1
Cyera: How Generative AI is Driving Investments in Data Security
22:42
22:42
Play later
Play later
Lists
Like
Liked
22:42
No one knows how far gen AI can go in the enterprise but we know that it will be massive. Future platforms will certainly streamline and ensure efficiency, accuracy, and impact. But there are many questions, including whether open source models perform as well as proprietary research? Will data compliance continue to be the main challenge the indus…
…
continue reading