My guest this week is David Cross and it is my second discussion with him. I loved talking to David when he was on the Microsoft side of the fence. Two years later, he is on the Google side of the fence as a Cloud Security Engineering Director, and I decided to bring him back on for another fun conversation.
We discuss Google’s on-premises Solutions, Data Custodian Model (SAP), the story behind BeyondCorp, Google’s beta product, called Identity-Aware Proxy and much more. Our conversation is a deep dive into IT Security and highly technical… Regardless of your title within IT Security realm, you will benefit from this conversation. Continue reading →
My guest this week is Seth Familian, who specializes in connecting powerful web-based tools and services to create highly customized marketing + analytics experiences for product and content marketing teams. He is the founder and principal of Familian&1, a visual insights and automation consultancy whose work has benefitted companies including Cisco, RingCentral, Adorama and Cloud9. Seth is also an avid educator with experience teaching over 800 students in 40+ workshops on Visual Design with Data, Working with Big Data, Digital Tools for Business and Affordable Web Design. He has lectured at General Assembly, Galvanize, Impact HUB SF, Presidio Graduate School, the Haas School of Business and KQED. Continue reading →
My guest this week is Jeff Williams, co-founder and Chief Technology Officer at Contrast Security.
The reason that I wanted Jeff on the program is that his technology was massively interesting to me, given that application attacks are the single biggest vector for security breaches. In 2017 There will be 111 billion new lines of code produced resulting in endless complexity.
His product was an Innovation Sandbox Finalist at RSA this year. So I wanted to understand more.
I have tried to integrate application level firewalls and experienced working through real & hard human challenges of coders and network security people trying to defend and deploy at the same time I wanted to understand his technology better AND because iterative application development is going to be even more important for companies for their security to move at the pace of the business innovation and applications development and testing becoming more and more iterative and agile. So how do we do this? Continue reading →