Personal Information
Entreprise/Lieu de travail
Knoxville, Tennessee Area United States
Profession
Helping organizations make their enterprise security programs effective and measurable.
Site Web
savagesec.com
À propos
Co-founded Savage Security to address InfoSec's core issues through applied research and consulting services. The model is simple: consulting funds the research, the results of which are applied during consulting. Any successful, proven research coming out of this virtuous cycle will always be freely available to the public, the community - even our competitors.
Mots-clés
cybersecurity
information security
infosec
endpoint security
breaches
startups
cloud
security
defense
blueteam
malware
due diligence
procurement
devops
enterprise security
cyber scouts
tech adoption cycle
innovation
early adoption
humor
trivia
bad stats
statistics
conspiracies
myths
markets
product evaluation
products
vendors
buyers guide
equifax
careers
sales
marketing
purple team
penetration testing
red team
product management
vulnerabilities
hacking
budget
employee engagement
ransomware
firstcon2017
threat detection
alert fatigue
threat prevention
devsecops
secdevops
anti-malware
anti-virus
ciso
cloud computing
venture capital
tech acquisitions
casb
cac
industry analysts
rast
market analysis
enterprise
vmi
sdp
osint
hybrid cloud
iaas
Tout plus
Présentations
(25)J’aime
(3)Sequoia Capital on startups and the economic downturn
Eric Eldon
•
il y a 15 ans
DevOpsDays PGH: How to Fail With One Weird Trick
Pete Cheslock
•
il y a 9 ans
Why We Can't Have Nice Things, A Tale of Woe and a Hope For the Future
Pete Cheslock
•
il y a 9 ans
Personal Information
Entreprise/Lieu de travail
Knoxville, Tennessee Area United States
Profession
Helping organizations make their enterprise security programs effective and measurable.
Site Web
savagesec.com
À propos
Co-founded Savage Security to address InfoSec's core issues through applied research and consulting services. The model is simple: consulting funds the research, the results of which are applied during consulting. Any successful, proven research coming out of this virtuous cycle will always be freely available to the public, the community - even our competitors.
Mots-clés
cybersecurity
information security
infosec
endpoint security
breaches
startups
cloud
security
defense
blueteam
malware
due diligence
procurement
devops
enterprise security
cyber scouts
tech adoption cycle
innovation
early adoption
humor
trivia
bad stats
statistics
conspiracies
myths
markets
product evaluation
products
vendors
buyers guide
equifax
careers
sales
marketing
purple team
penetration testing
red team
product management
vulnerabilities
hacking
budget
employee engagement
ransomware
firstcon2017
threat detection
alert fatigue
threat prevention
devsecops
secdevops
anti-malware
anti-virus
ciso
cloud computing
venture capital
tech acquisitions
casb
cac
industry analysts
rast
market analysis
enterprise
vmi
sdp
osint
hybrid cloud
iaas
Tout plus