Personal Information
Unternehmen/Arbeitsplatz
Knoxville, Tennessee Area United States
Beruf
Helping organizations make their enterprise security programs effective and measurable.
Webseite
savagesec.com
Info
Co-founded Savage Security to address InfoSec's core issues through applied research and consulting services. The model is simple: consulting funds the research, the results of which are applied during consulting. Any successful, proven research coming out of this virtuous cycle will always be freely available to the public, the community - even our competitors.
Tags
cybersecurity
information security
infosec
endpoint security
breaches
startups
cloud
security
defense
blueteam
malware
due diligence
procurement
devops
enterprise security
cyber scouts
tech adoption cycle
innovation
early adoption
humor
trivia
bad stats
statistics
conspiracies
myths
markets
product evaluation
products
vendors
buyers guide
equifax
careers
sales
marketing
purple team
penetration testing
red team
product management
vulnerabilities
hacking
budget
employee engagement
ransomware
firstcon2017
threat detection
alert fatigue
threat prevention
devsecops
secdevops
anti-malware
anti-virus
ciso
cloud computing
venture capital
tech acquisitions
casb
cac
industry analysts
rast
market analysis
enterprise
vmi
sdp
osint
hybrid cloud
iaas
Mehr anzeigen
Präsentationen
(25)Gefällt mir
(3)Sequoia Capital on startups and the economic downturn
Eric Eldon
•
Vor 15 Jahren
DevOpsDays PGH: How to Fail With One Weird Trick
Pete Cheslock
•
Vor 9 Jahren
Why We Can't Have Nice Things, A Tale of Woe and a Hope For the Future
Pete Cheslock
•
Vor 9 Jahren
Personal Information
Unternehmen/Arbeitsplatz
Knoxville, Tennessee Area United States
Beruf
Helping organizations make their enterprise security programs effective and measurable.
Webseite
savagesec.com
Info
Co-founded Savage Security to address InfoSec's core issues through applied research and consulting services. The model is simple: consulting funds the research, the results of which are applied during consulting. Any successful, proven research coming out of this virtuous cycle will always be freely available to the public, the community - even our competitors.
Tags
cybersecurity
information security
infosec
endpoint security
breaches
startups
cloud
security
defense
blueteam
malware
due diligence
procurement
devops
enterprise security
cyber scouts
tech adoption cycle
innovation
early adoption
humor
trivia
bad stats
statistics
conspiracies
myths
markets
product evaluation
products
vendors
buyers guide
equifax
careers
sales
marketing
purple team
penetration testing
red team
product management
vulnerabilities
hacking
budget
employee engagement
ransomware
firstcon2017
threat detection
alert fatigue
threat prevention
devsecops
secdevops
anti-malware
anti-virus
ciso
cloud computing
venture capital
tech acquisitions
casb
cac
industry analysts
rast
market analysis
enterprise
vmi
sdp
osint
hybrid cloud
iaas
Mehr anzeigen