My guest this week is Riz Jan, the Vice President, Chief Information Officer at The Henry M. Jackson Foundation (HJF) For the Advancement of Military Medicine.
Riz is a dynamic technology and security executive leading an extensive strategic digital transformation to simplify and modernize the technology architecture within HJF.
In this interview, Riz and I focus on what it takes to be a great IT leader and the crucial investments you need to make in yourself.
What I love about Riz’s leadership philosophy that stems from his immigrant background is his no fear approach in taking risks. Listen to this episode to learn more about the role of legacy and making a positive impact as an IT leader. Continue reading →
My guest this week is Seth Familian, who specializes in connecting powerful web-based tools and services to create highly customized marketing + analytics experiences for product and content marketing teams. He is the founder and principal of Familian&1, a visual insights and automation consultancy whose work has benefitted companies including Cisco, RingCentral, Adorama and Cloud9. Seth is also an avid educator with experience teaching over 800 students in 40+ workshops on Visual Design with Data, Working with Big Data, Digital Tools for Business and Affordable Web Design. He has lectured at General Assembly, Galvanize, Impact HUB SF, Presidio Graduate School, the Haas School of Business and KQED. Continue reading →
My guest this week is Jeff Williams, co-founder and Chief Technology Officer at Contrast Security.
The reason that I wanted Jeff on the program is that his technology was massively interesting to me, given that application attacks are the single biggest vector for security breaches. In 2017 There will be 111 billion new lines of code produced resulting in endless complexity.
His product was an Innovation Sandbox Finalist at RSA this year. So I wanted to understand more.
I have tried to integrate application level firewalls and experienced working through real & hard human challenges of coders and network security people trying to defend and deploy at the same time I wanted to understand his technology better AND because iterative application development is going to be even more important for companies for their security to move at the pace of the business innovation and applications development and testing becoming more and more iterative and agile. So how do we do this? Continue reading →
My guest this week is the Global VP of IT of Seacret Direct, Stephanie Nelson. If you are a young IT Leader or the one that doesn’t want your clock cleaned by young talent, you need to listen to my conversation with Stephanie to see how someone, working with a rapidly growing worldwide company as a VP of IT, is executing. Continue reading →
In the next few years we will see the emergence of exponential technologies that, when implemented in unison, will greatly improve cyber security. One example that is relevant for CIOs is the joining of Artificial Intelligence and Big Data to help executives visualize cyber intelligence information to improve decision-making and better target IT investments.
Big Data offers enormous opportunity, but there are two core issues that need to be addressed. One problem with Big Data is that often we do not know how to interpret the data. When we do, it usually gets passed from expert to executive in a way that does not necessarily provide a better understanding of the information, or how it can be applied to the problem at hand.
The second issue is that often we do not know how to best interact with the data that we are interpreting. The days of 100-page data summaries are nearing an end. We now need effective and streamlined solutions to limit these inefficiencies. Continue reading →