Marco Genovese, Noriko Bouffard, Chad Cardenas – ESW #337
Full Audio
View Show IndexSegments
1. The Evolving Role of the Browser in the Modern Enterprise World – Noriko Bouffard, Marco Genovese – ESW #337
In the age of remote and hybrid work, employees are now spending most of their time in the browser or virtual meetings, making the browser an increasingly important part of an enterprise's security strategy. According to Gartner, “By 2030, enterprise browsers will be the core platform for delivering workforce productivity and security software on managed and unmanaged devices for a seamless hybrid work experience.”
Learn more about:
- The browser's role in a business's security strategy
- How an enterprise browser can support your workforce
- Zero Trust Architecture and how businesses can enforce context-aware access controls and add customizable data loss prevention
Segment Resources:
- Complimentary Gartner Emerging Tech: Security – The Future of Enterprise Browsers Report
- Get started with Chrome Enterprise for free
- Learn about Google's Zero Trust solution, BeyondCorp Enterprise
- Customer spotlight: Check out the Google Cloud Next recording to hear how Snap is leveraging our secure enterprise browsing solution to protect their workforce
- How to contact us This segment was sponsored by Google Chrome Enterprise. Visit https://securityweekly.com/chromeenterprise to learn more!
Announcements
Join us for one of our Identiverse Regional Events, coming up on December 1st in New York City and December 5th in Chicago! Participate alongside local experts and regional peers in information-rich sessions on the latest technologies, best practices, and industry trends.
Secure your complimentary registration at securityweekly.com/idvregionalevents2023
Guests
Noriko Bouffard heads the Chrome Browser customer engineering team and is based in San Francisco. Her team helps customers apply Chrome’s enterprise best practices and advocates on their behalf to shape product roadmap. Before Google, Noriko worked at NetApp and IBM designing and implementing complex solutions across various platforms and has over 15 years of industry experience. In her free time, Noriko likes to play taiko drums with a local group in the Bay Area, camping and biking and is always on the lookout for the best dimsum or noodle soup where she travels.
Marco Genovese currently leads the Zero Trust Architecture organization at Google in the San Francisco Bay Area. He and his team design and implement advanced and easy-to-use least privilege access solutions for customers globally. Over the past 20 years, he has worked for a variety of companies, including PGP, Symantec, and Palo Alto Networks, developing and deploying software solutions to protect networks, systems, and data for companies and organizations around the world. In his free time, Marco likes to build cars, design with 3D printers, automate his home and convince his daughters that computers are the coolest things on the planet.
Hosts
2. Alternative Approaches to Startup Funding – The Syndicate Group – Chad Cardenas – ESW #337
In this interview, we talk to Chad Cardenas about why he created The Syndicate Group, which operates very differently from the typical VC firm with LPs and a collective fund to draw from. We'll discuss how the investor/startup relationship differs, and what the advantages of this model are.
Announcements
Security Weekly Listeners: We are celebrating the milestone of reaching over 1,000 members of our CISO community. The Cybersecurity Collaboration Forum is a one-stop shop for executive collaboration comprised of CISOs across various industries. If you want to be part of this growing community of CISOs, join us as a member or technology partner. To learn more, visit: securityweekly.com/cybersecuritycollaboration
Guest
Chad Cardenas is Founder and CEO of The Syndicate Group (TSG), and Managing Director of Syndicate Venture Partners, which is pioneering a new evolution of Venture Capital investing. TSG helps startups scale faster by organizing exclusive investment access to channel partners that commit capital and also tap the broader channel ecosystem to support a company’s go-to-market strategy. With 25 years in the enterprise technology sector, Chad maintains a wealth of experience in sales, leadership, business transformation, innovation, distribution channels and go-to-market strategies for enterprise startups. Previously, Chad co-founded Trace3, where he served as President and Chief Innovation Officer, studying macro trends in the IT industry and their effects on the VC, startup, channel, CXO and investor communities. He helped build the tech reseller/integrator to 400 people and over $500M in revenue before a private equity event in 2017.
The Syndicate Group was born out of these experiences, based on the realization that startup founders need more than just capital, but partners who really understand their business and who can align both the investor and startup interests from a sales perspective. Channel partners in the TSG network are able to stay ahead of emerging tech trends, gaining early access to great resale relationships as well as sharing in the value-growth upside of the greatest enterprise tech companies through private, pre-IPO investments. TSG’s investment scorecard includes high-fliers such as AppDynamics, CrowdStrike, Nutanix, Vast Data and Cohesity, where Chad played a key role driving an aggregate market value of over $30 billion.
Hosts
3. Cybersecurity Unicorns Are Back, the Okta Breach Is Bad, & Don’t Invest in Startups – ESW #337
This week, we discuss Island's raise, unicorn status, and what that means for both the enterprise browser market and the cybersecurity market in general. We discuss Censys and the state of the external attack surface management market, or what they're trying to call, "exposure management". We discuss the details of the Okta breach in depth, and why we're worried about the larger impact it could have on the industry and vendor trust in general. Finally, we wrap up with some fun squirrel stories.
Announcements
Follow Security Weekly Productions on LinkedIn for exclusive show clips, insights, and updates across our organization! Stay connected with our hosts and fellow community members, and join the conversation that's shaping the future of cybersecurity.
Hosts
- 1. FUNDING: Island Raises $100 Million In Series C Funding; Increases Valuation to $1.5 Billion
new funding validates massive product-market fit
- 2. FUNDING: Cybersecurity software provider SecureW2 raises $80m from Insight Partners
- 3. FUNDING: Censys Secures $75M in New Funding
- 4. FUNDING: Adlumin Closes $70M Series B, Fueling its Mission of Bringing Enterprise-Grade Security to Mid-Market Organizations
- 5. FUNDING: Prove Identity Raises $40M in Funding
- 6. FUNDING: Fingerprint Raises $33M in Series C Funding
- 7. FUNDING: Darwinium Raises $18 Million for Edge-Based Fraud Prevention Tech
- 8. FUNDING: Spec Secures $15M Series A Funding, Accelerating Innovation in Fraud Defense
- 9. FUNDING: Deepfake Detection Platform Reality Defender Secures $15 Million in Series A Funding Led by DCVC
- 10. FUNDING: Harmonic Security Lands $7M Funding to Secure Generative AI Deployments
- 11. FUNDING: Zygon raises $3M in seed funding to create security solutions for the SaaS era
- 12. NEW COMPANIES: Expent – Automating Vendor Management
- 13. NEW TOOLS: HAR Sanitizer
- 14. NEW TOOLS: BlueTuxedo
A tiny tool built to find and fix common misconfigurations in Active Directory-Integrated DNS.
- 15. HACKS: I Tested an HDMI Adapter That Demands Your Location, Browsing Data, Photos, and Spams You with Ads
Forget Juice Jacking - if you want to worry about weird side-channel attacks, check out these findings on some shady HDMI adapters!
- 16. HACKS: They Cracked the Code to a Locked USB Drive Worth $235 Million in Bitcoin. Then It Got Weird
- 17. BREACHES: How Cloudflare mitigated yet another Okta compromise
- 18. BREACHES: Okta Support System incident and 1Password
- 19. BREACHES: BeyondTrust Discovers Breach of Okta Support Unit
- 20. ESSAYS: Cyber Governance: What is Fair to Expect from Board Directors and Management? 3 of 4
Third in a series of four essays from Jerry Perrulo.
- 21. ESSAYS: Threat-informed Defense Is Hard, So We Are Still Not Doing It!
Exploring this via social media
- 22. ESSAYS: The Role of a Cybersecurity Architect – Frank McGovern
- 23. TRENDS: HSBC bans company phone texting
Yeah, good luck with that.
- 24. LEGISLATION: Top US Cyber Agency Pushing Toward First Hack Reporting Rule
- 25. SQUIRREL: How to Exit Nano
- 26. SQUIRREL: Another Day, Another KEV Viz
Bad visualizations plague most industries, and cybersecurity is no different.