Sign in to view Carolyn’s full profile
or
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Sign in to view Carolyn’s full profile
or
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
San Francisco Bay Area
Sign in to view Carolyn’s full profile
Carolyn can introduce you to 1 people at Marticulate
Join with email
or
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
7K followers
500+ connections
Sign in to view Carolyn’s full profile
or
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Carolyn
Carolyn can introduce you to 1 people at Marticulate
Join with email
or
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Carolyn
or
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Sign in to view Carolyn’s full profile
or
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
About
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
Services
Articles by Carolyn
-
Make the Most of RSA 2020 with these Must-See Events
Make the Most of RSA 2020 with these Must-See Events
Despite the concerns stemming from the Coronavirus, RSA 2020 is in full swing. This year, as with each prior year, the…
35
2 Comments -
The Can’t-Miss Events and Exhibitor Booths at RSA Conference 2019Feb 28, 2019
The Can’t-Miss Events and Exhibitor Booths at RSA Conference 2019
The RSA Conference is an event that we as cybersecurity professionals look forward to every year. It’s a great…
39
4 Comments -
See and Be Seen at Black Hat 2018!Aug 3, 2018
See and Be Seen at Black Hat 2018!
Given the popularity of my last must see and do blog for RSA, I am continuing the tradition for Black Hat 2018. If you…
9
-
Looking for Fun at RSA: Must See Booths for RSAC 2018Apr 12, 2018
Looking for Fun at RSA: Must See Booths for RSAC 2018
Heading off to RSA this year? These are some must-see booths where the exhibitors have kicked it up a notch to make…
16
1 Comment -
HIT Think How healthcare security efforts can incorporate advanced tech toolsMar 21, 2018
HIT Think How healthcare security efforts can incorporate advanced tech tools
As originally published at HealthDataManagement.com https://www.
4
-
How to Evaluate Deception Platforms and ChecklistJun 17, 2016
How to Evaluate Deception Platforms and Checklist
With over 700 reported breaches occurring annually, a modern day adaptive security approach requires a combination of…
16
Activity
7K followers
-
Carolyn Crandall shared thisHoly moly! Wow!
-
Carolyn Crandall reposted thisCloudy Outlook for Cyber Jobs as AI Fills Security Gaps - The Wall Street Journal article, quoting our CEO Ram Varadarajan, highlights how AI is reshaping cybersecurity roles. 🔗 Read the full article in the WSJ: https://lnkd.in/geMBgsqp #Cybersecurity #AI #CISO #SecurityOperations #Automation #CyberDefense #FutureOfWorkCarolyn Crandall reposted thisThe Wall Street Journal takes a timely look at how AI is reshaping cybersecurity roles—and what it really means for the future of security teams in an article that quotes our CEO, Ram Varadarajan. As organizations face increasingly automated, machine-speed attacks, the traditional labor model is evolving. Ram notes in the article: “The cybersecurity labor model is being quietly rebalanced. Organizations are not eliminating people, but they are reducing reliance on manual analysis in favor of automation that operates at machine speed.” This shift isn’t about fewer defenders—it’s about changing how defenders work. AI-driven automation is taking on tasks that humans simply can’t scale, allowing teams to focus on strategy, judgment, and response while technology operates continuously and at speed. As the threat landscape accelerates, success will depend on pairing human expertise with security approaches designed for automation-first defense. 🔗 Read the full article in the WSJ: https://lnkd.in/geMBgsqp #Cybersecurity #AI #CISO #SecurityOperations #Automation #CyberDefense #FutureOfWorkCloudy Outlook for Cyber Jobs as AI Fills Security GapsCloudy Outlook for Cyber Jobs as AI Fills Security Gaps
-
Carolyn Crandall shared thisMost companies are playing defense in cybersecurity. But what if defense could look like offense? I’ve had the privilege of working with Adm. (Ret.) James “Sandy” Winnefeld, former 9th Vice Chairman of the Joint Chiefs of Staff, over the past couple years. He’s one of those rare leaders who sees around corners and doesn’t pull punches. His latest piece on Deception Cybersecurity is worth your time. → How to weaponize AI → Why active defense is no longer optional → What turning the tables on attackers really looks like This isn’t a think piece. It’s a tactical playbook, written by someone who’s commanded battlefields, both physical and digital. If you're responsible for protecting digital infrastructure or advising those who are, I highly encourage you to read it. #cybersecurity #deceptiontechnology #activedefenseCarolyn Crandall shared thisDeception Cybersecurity - Using AI and active defense to turn the tables on the attacker https://lnkd.in/gkWFnHZh In his insightful article, James “Sandy” Winnefeld, Adm. (Ret.), former 9th Vice Chairman of the Joint Chiefs of Staff, reflects on the evolution of cyber deception and the profound role of AI in redefining it. He argues that when attackers harness AI to create “more—and more enticing—traps than humans can,” defenders must respond with equal sophistication. What once was purely human-driven deception is now enhanced by AI’s scale, creativity, and adaptability. ➡️ At Acalvio Technologies, we align with this view: modern defense isn’t just about blocking attacks—it’s about turning the tables. By embedding AI-powered deception throughout IT, OT, and cloud environments, we force adversaries into costly decisions, expose their tactics, and tilt the advantage toward the defender. 📖 Read the full article here: https://lnkd.in/gkWFnHZh #CyberDeception #PreemptiveDefense #AIinSecurity #CyberSecurity #AIPoweredDeception
-
Carolyn Crandall reposted thisCarolyn Crandall reposted thisDon’t we all have the right to know who’s really on the other side of the screen? To know they are at least who they claim to be? That's our obsession at GetReal Security: restoring trust in our digital communications. Because today, the way into organizations isn't always through firewalls or infrastructure. It's through people. And all it takes is one employee believing something that isn't real or authentic. And right now, the attack surface everyone's talking about is hiring. Recruiters tell me it's becoming an absolute nightmare - fake candidates, synthetic identities, and people showing up to interviews who aren't who they claim to be. Crazy as it sounds, it's not just about finding great talent anymore. You also have to make sure they're real. That’s why we’re expanding Protect, our real-time deepfake protection solution for Teams and Webex, with Zoom next. This isn't just about catching spies or a candidate using SwapFace. It's also about knowing when someone is hiding behind their AI avatar. It's about the basic right to know who you are talking to.
-
Carolyn Crandall reposted thisCarolyn Crandall reposted thisHany Farid joins NBC News to unpack the controversy around Will Smith’s concert footage, after fans accused him of using AI to fake cheering crowds. So is it real or fake? It’s nuanced. And that’s the problem: as the technology improves, the line between reality and fiction keeps blurring. That’s why at GetReal, we’re building the technology to restore trust in a world where seeing is no longer believing. 🔗 https://lnkd.in/dfYSNzat #AI #Deepfakes #DigitalTrust #NBCNews #GetRealWill Smith accused of using AI to fake crowds in concert videoWill Smith accused of using AI to fake crowds in concert video
-
Carolyn Crandall reposted thisCarolyn Crandall reposted thisHow do we know what’s real anymore? Our Chief Science Officer, Hany Farid, joins astrophysicist Hakeem Oluseyi on Particles of Thought — a new video podcast from the producers of NOVA that explores the science shaping our future. Together, they dive into AI, deepfakes, and the future of truth in the digital age. Premieres Monday, August 25 at 6pm PT / 9pm ET on YouTube: https://lnkd.in/dGWt8S_P Hany will be live in the chat, answering your questions in real time. Don’t miss it.
-
Carolyn Crandall reposted thisCarolyn Crandall reposted thisCISOs: How confident are you that every candidate in your hiring pipeline is who they claim to be? Gartner predicts one in four job applicants will be an imposter by 2028. Adversaries and nation-state actors are already using deepfakes and synthetic identities to slip past interviews, background checks, and onboarding. The result: imposters embedded inside corporate systems with trusted access. We're no longer just defending the back door of IT infrastructure. The front door — HR and recruiting — has become one of the enterprise's most vulnerable attack surfaces. That's why we created The Hiring Kill Chain: a framework to expose how attackers infiltrate and how to disrupt them before they become insiders. Download the new whitepaper: https://lnkd.in/gN3mMZdy It's time to restore trust in the hiring process. #Deepfakes #InsiderRisk #Cybersecurity #HR #Hiring
-
Carolyn Crandall reposted thisCarolyn Crandall reposted thisDo you know how costly a deepfake attack can be to an organization? A British engineering firm reported losing 20 million pounds after scammers used a live deepfake video to impersonate their company executives during a meeting. https://lnkd.in/ecSV6aZp Organizations need to enable real fraud defenses before the financial or reputational damages from a deepfake attack exceed their ability to recover. See how GetReal's content authentication solutions help.AI cybersecurity risks and deepfake scams on the riseAI cybersecurity risks and deepfake scams on the rise
-
Carolyn Crandall reposted thisCarolyn Crandall reposted this“While the harms from deepfakes are real and already with us, perhaps the most pernicious result of deepfakes and general digital trickery is that when we enter a world in which anything we see or hear can be fake, then nothing has to be real.” Read our Co-Founder and Chief Science Officer, Hany Farid’s recent paper in PNAS Nexus that traces the evolution of manipulated media — from early airbrushing to today’s AI-generated images — and how to mitigate the risks that will be caused by the oncoming tidal wave of deepfakes while preserving the creative potential of GenAI. https://lnkd.in/eSn2SgjV
-
Carolyn Crandall liked thisCarolyn Crandall liked thisBeen sitting on this one for a while and thank someone for long flights. Which I have now been going through my backlog. The category we call "deception technology" has been doing itself a disservice with that name for years. When configured properly, it's one of the highest-fidelity detection signals available in the modern enterprise including for zero-days your EDR will never catch. But try getting budget for "deception" and see how far you get. Here's the reframe I've used to actually get this funded, plus some honest thoughts on where the vendors keep getting it wrong. Happy to be wrong on any of this. #CISO #CyberLeadership #DetectionEngineering #SOC #DeceptionTechnology #ZeroDay #CyberStrategy #DefLeppardCISOStop Calling It Deception. Start Calling It High-Fidelity Detection.Stop Calling It Deception. Start Calling It High-Fidelity Detection.Jeff Moore
-
Carolyn Crandall liked thisCarolyn Crandall liked this🎉 I’m thrilled to share that I’ve joined Nexus Venture Partners! 🌐 Our team brings two decades of experience bridging two of the world’s most dynamic and fastest-growing tech ecosystems, taking a founder-first approach working with entrepreneurs building category-defining companies. With $3.2b under management, Nexus invests early- from inception, seed, and series A and beyond- to tackle the AI Stack (infra to agents), enterprise software, developer tools, open source, cybersecurity, consumer, and more. These include global leaders like Postman, Apollo.io, Fingerprint, Zepto, and Rapido, as well as rocketship disruptors like Daloopa, Firecrawl, Gumloop, Avoca, Giga, and Freehand – all making an outsized impact across industries. 🌎🚀 🤝 In my role, I’m excited to bridge the gap between our founders and our global network of CxOs and decision-makers to foster collaboration, engage partners, and help build our brand. If you're an executive interested in learning what's next, exploring emerging tech, and partnering with extraordinary companies to drive growth and efficiency while advancing your competitive edge, I’d love to connect. 🙏 Thank you Abhishek Sharma, Jishnu B., Suvir Sujan, and Anup Gupta for the opportunity. I’m grateful to be a part of such a humble, talented, and hard-working team. 👇 See links below in comments to learn more.
-
Carolyn Crandall liked thisCarolyn Crandall liked thisAI is collapsing the time between vulnerability discovery and exploitation from weeks to hours. For mobile apps, that changes everything about how we test, prioritize, and manage risk. What does a Mythos ready security program look like for mobile?The AI Vulnerability Storm Is Already Hitting Mobile AppsThe AI Vulnerability Storm Is Already Hitting Mobile AppsDavid Weinstein
-
Carolyn Crandall liked thisCarolyn Crandall liked thisFollowing #RSAC2026, one thing is clear: the future of cybersecurity and AI must be built through collaboration across geographies, public and private sectors, and companies of every size. This reality shaped Forgepoint's work alongside our community over the past month: 🛡️ Securing Agentic AI: AI agents are creating a new attack surface with a growing blast radius and a narrowing window to act. That's why we led Capsule Security's $7M Seed round alongside Lama Partners, backing the team defining runtime agent security at the moment enterprises need it most. Welcome to the #ForgepointFamily Naor Paz ❇️, Lidan Hazout ❇️, and the Capsule team! 🌉 Convening with Community at RSAC: We gathered with hundreds of enterprise CISOs, startup founders, investors, operators, and government leaders as we co-hosted the 16th Annual Executive Dinner with PwC and Google Cloud Security and the Sixth Annual National Security Social with IQT and Shield Capital. Our team shared insights at several panels and keynotes across international ecosystems, while 19 of our portfolio companies showed up in force on the Expo Floor and beyond. 🌍 Expanding Our Global Network: We were thrilled to welcome Cecil Perez, VP Europe at Qualys, to our Global Advisory Council this month. With decades of international GTM and sales leadership across enterprise security, Cecil's deep expertise will be invaluable for our portfolio founders scaling their companies globally. Read the April edition of our Forefront newsletter to learn more, plus the latest Margin of Safety posts from Jimmy Park and Kathryn Shih, Dr. Shane Shook's new TIPS post, and notable portfolio wins across the board. 👇 Explore the full breakdown
-
Carolyn Crandall liked thisCarolyn Crandall liked thisBrilliant insight from our very own, Lawrence Pingree! We recently hosted a webinar on how agentic AI is reshaping deception platforms, and one key takeaway stood out: preemptive cyber defense is redefining how organizations stay ahead of attackers. Security teams are moving beyond traditional detection and response toward actively disrupting adversaries before damage is done. Deception technology is at the forefront, and #AI is accelerating it faster than most teams realize. Here's what's changing: 1️⃣ AI provides the intelligence layer: Deception systems can now learn, reason, and make autonomous strategic decisions, no manual tuning required. 2️⃣ Agentics adds execution: Autonomous agents independently carry out specific deception goals, creating customized, realistic threat actor experiences at scale. 3️⃣ SOC efficiency improves: High-confidence signals from preemptive defense reduce noise and help teams reimagine workflows, from reactive alert triage to proactive adversary steering. The result? Organizations can deploy realistic decoys: fake networks, servers, and credentials, to detect threats earlier, gather critical attack intelligence, and redirect adversaries away from real assets. Even sophisticated intrusions can be neutralized before they reach what matters. If you found this interesting, watch our full conversation with Acalvio Technologies here: https://lnkd.in/ebphVwSr #Cybersecurity #DeceptionTechnology #SOC #AIsecurity #PreemptiveDefense #CISOPriorities #ThreatIntelligence #CloudSecurity
-
Carolyn Crandall liked thisThanks, Cyber Defense Magazine, for the Global InfoSec Awards in two categories during the RSA Conference last week! 🏆 Next Gen AI-Powered Threat Detection 🏆 Deception-Based Security Here is a short video of our CMO, Anand Akela, accepting the awards. #AIPoweredDeception #Preemptive #CybersecurityCarolyn Crandall liked thisIn a world of constant threats, execution matters. Congratulations to the Global Infosec Award Winner 2026, Acalvio Technologies, setting the pace for what modern security should look like. #InfoSec #GIA26
-
Carolyn Crandall liked thisCarolyn Crandall liked thisHonored to represent Constella Intelligence, a Forgepoint Capital company, while receiving a 2026 SC Award for "Resilient CISO" during RSAC. In today’s environment, resilience is not a soft concept. It is a leadership discipline. It is the ability to absorb pressure, adapt quickly, and keep the business moving despite uncertainty and adversity. Grateful for the exceptional people I’ve worked with over the years who have helped shape that mindset and made the mission meaningful. #RSAC #SCAwards #Cybersecurity #Leadership #Resilience #CISO
-
Carolyn Crandall liked thisCarolyn Crandall liked thisHonored to receive the Global InfoSec Awards 2026 from Cyber Defense Magazine in two categories on behalf of Acalvio Technologies during the RSA Conference week! 🏆 Next Gen AI-Powered Threat Detection 🏆 Deception-Based Security This recognition reflects the incredible work of the Acalvio team in pushing the boundaries of AI-Powered, preemptive, deception-driven cybersecurity—especially as AI continues to reshape both attacks and defense. Grateful to be part of this journey and to our customers and partners for their continued trust. #Preemptive #CyberSecurity #CyberDeception #AIPowered #PreemptiveDefense #InfoSec #Acalvio #RSAC
Experience & Education
-
Marticulate
******* *** *** * ******* * ********** ***
-
*********
**** *** *******
-
****
**** *** *******
View Carolyn’s full experience
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
Recommendations received
22 people have recommended Carolyn
Join now to viewView Carolyn’s full profile
-
See who you know in common
-
Get introduced
-
Contact Carolyn directly
Other similar profiles
-
Amanda St L Jobbins
Amanda St L Jobbins
Global technology executive | NED | Keynote speaker | Top 100 Marketer | Cranfield FTSE Top 100 Women in Business
8K followersUnited Kingdom
Explore more posts
-
CMIT Solutions
8K followers
AI-driven cyberattacks are becoming one of the biggest threats facing small and medium-sized businesses today. That’s why we’re proud to have Jordan Smith, VP at CMIT Solutions, speaking at the 4th Annual Excellerate Central Oregon Business Forum on September 11 at the Riverhouse Convention Center. Jordan will share insights on how AI is changing the cybersecurity landscape and most importantly, how business leaders can defend against evolving threats. The Excellerate Forum brings together top business leaders from across Central Oregon for a morning of learning, networking, and strategies to thrive in the years ahead. 📅 Thursday, September 11 | 6:30 – 10 AM PDT 📍 Riverhouse Convention Center | Bend, OR 👉 Register here: [https://lnkd.in/guPrQmnv]
5
-
Eric Herzog
Infinidat • 32K followers
To learn how critical enterprise storage is to your corporate cyber security strategy, join enterprise cyber storage resilience and recovery leader Infinidat in booth N4301 at the RSA Conference Mar 23-26 San Francisco. See how Infinidat's InfiniSafe cyber storage software suite can recover your immutable snapshots in under 1 minute - regardless of dataset size - on the InfiniBox G4 family of enterprise storage platforms and under 20 minutes - regardless of dataset size - on the InfiniGuard purpose-built-backup-appliance - https://bit.ly/4rACBFl Infinidat Erik Kaulberg Bob Cancilla Yair Hershko Chen Kuzi Yossi Siles Oren Honen Bill Basinas Karine Haase Charlotte Tang Rebecca Kraushaar Patrick Pease Mike Hoeck Paul Furtado Matthew Brisse Fintan Quinn Scott Sinclair Ralf Jordan Rick Vanover Demetrius M. Misha Lewis Rangel Dave Russell Dave Pearson Irene Noser Mitch Ashley Mitchell Lewis Romelle Herring Frank Dickson Phil Goodwin Ashish Nadkarni Matt Eastwood Rick Villars Dave McCarthy Carol Sliwa Tony Petcou Darren Gourley Laura Tuller Kirsten Craft Keith Townsend Will Townsend
1
-
Eric Herzog
Infinidat • 32K followers
To learn how critical enterprise storage is to your corporate cyber security strategy, join enterprise cyber storage resilience and recovery leader Infinidat in booth N4301 at the RSA Conference Mar 23-26 San Francisco. See how Infinidat's InfiniSafe cyber storage software suite can recover your immutable snapshots in under 1 minute - regardless of dataset size - on the InfiniBox G4 family of enterprise storage platforms and under 20 minutes - regardless of dataset size - on the InfiniGuard purpose-built-backup-appliance - https://bit.ly/4rACBFl Mitch Mahoney Brandon McIntire Ian Smith Phil Drachman Noemi Greyzdorf Joe Roa Glenn Fujimoto Betti Porat Aviad Offer Xu Cheng Timothy Shirley Phil Bullinger Steve Sullivan Richard Gordon John Faccibene Jr David Sawyer Bill Basinas Tim Dales Fran Bruno Karine Haase Rebecca Kraushaar Vladimir Rozanovich Hande Sahin-Bahceci Bill Jaeger Bret Gibbs Fernanda Ferreira Torres Brian Salley Ted Carlson Stan Wysocki Chris Bogan Stephen Rodriguez Mark III Systems Pellera Technologies US Signal Tyrel Diekmann Daven Winans John White Laura Pursley Kelly Nuckolls CAS Severn, Inc
3
-
Eric Herzog
Infinidat • 32K followers
Cybersecurity regulations and directives have a significant impact on your overall cyber resilience strategy and infrastructure investments. Join Solutions Review and Infinidat's Eric Herzog and Tim Dales on May 15 to understand what the NIST, DORA, and NIS2 frameworks require with respect to storage infrastructure. You'll learn how Infinidat’s storage platforms tightly align with these cybersecurity guidelines, plus how our built-in InfiniSafe cyber-resilience capabilities can help you reduce ransomware risks and ensure rapid recovery in the event of a cyberattack. https://okt.to/1KdFAR
8
-
Eric Herzog
Infinidat • 32K followers
If you missed enterprise cyber and AI storage leader Infinidat at Gartner IOCS last week, join us TOMORROW (Dec 18) as we discuss the critical trends in enterprise storage at the 7th Annual Insight Jam Conference in our keynote address: "Key Enterprise Storage Topics For Machine Age Market Architecture". Tune in at 8am PT/11am/4pm GMT/5pm CET to explore how 2026 will unfold for enterprise storage: • Cyber storage resilience and its critical importance to an overall corporate cyber security strategy • AI - both enterprise storage for AI applications and workloads and also the use of AI inside of storage systems for ease of management and to cut costs • The impact of enterprise storage on power budgets and power efficiency • How enterprise storage can dramatically reduce IT CAPEX, IT OPEX, and IT resource needs https://bit.ly/48T0osy Oren Yesharim David Beltrán Vera David Humes II David Sawyer David Muench Tim Dales Bill Basinas Fran Bruno David Lubrano Benjamin Lew Tom Manganaro Tom Dionne Daniel Potts Donato Ceccomancini Marco Meraviglia ☁ Andrea Sappia Andrea Fraietta Marcus Benham Juliet McMullen Anthony DeLisio Karine Haase Lynsy (Calvario) Marshall Rebecca Kraushaar Revital Aharon-Frimerman Kfir Kayakov Shira Ginsburg Solutions Review Tim King Maleeha Haider Jonathan Paula 📸Craig Hibbert Bob Stone Pete Byrne Paul S. Gaccione Paul Stewart George Deveau James Meyers Gene Kussmann JT Lewis Lee Bushnell
5
-
Digital Reference
3K followers
🌟 The SaaS world moves fast, and scaling efficiently requires strategic alignment, operational rigor, and cross-functional coordination. Fractional COOs are helping early- and mid-stage SaaS companies grow seamlessly while maintaining agility. At 𝗗𝗶𝗴𝗶𝘁𝗮𝗹 𝗥𝗲𝗳𝗲𝗿𝗲𝗻𝗰𝗲, we’re committed to 𝘁𝗿𝗮𝗻𝘀𝗽𝗮𝗿𝗲𝗻𝗰𝘆 𝗮𝗻𝗱 𝗮𝘂𝘁𝗵𝗲𝗻𝘁𝗶𝗰𝗶𝘁𝘆—spotlighting leaders who combine operational expertise with strategic insight to drive measurable results. 👋 𝗠𝗲𝗲𝘁 Dawn Strobel, 𝗙𝗿𝗮𝗰𝘁𝗶𝗼𝗻𝗮𝗹 𝗖𝗢𝗢 Dawn helps SaaS companies align strategic objectives with day-to-day execution, ensuring scalable growth without sacrificing agility. She specializes in operational strategy, cross-functional alignment, process optimization, and efficiency audits. Here’s what she’s known for: ✅ Operational strategy for scaling 🏷️ Cross-functional alignment 🌟 SaaS process optimization 🔎 Operational efficiency audits Dawn empowers SaaS teams to scale smarter, improve performance, and operate with clarity—turning strategy into action at every level. 🔗 Learn more about Dawn Strobel and other Fractional COO professionals for SaaS companies here: https://lnkd.in/dSzCuv-R
1
-
Audit Advantage Group
88 followers
For rapidly scaling SaaS companies, landing those crucial enterprise clients is the ultimate growth accelerator. But there's a gatekeeper: SOC 2 compliance. For major corporations, demonstrating robust data security is a fundamental requirement. A clean SOC 2 report proves your commitment to protecting sensitive data, building essential trust, and unlocking significant new revenue streams. Don't let compliance be a hurdle; let it be your competitive edge. Is your SaaS ready to secure those high-value enterprise deals? Learn how SOC 2 paves the way. 🔗 https://lnkd.in/gcQvWnwb 📞 888-341-7149 #SaaSGrowth #EnterpriseSales #SOC2Compliance #TechBusiness #ClientTrust #AuditAdvantage #ScaleUp #DataSecurity
1
-
Jaideep Khanduja
CX Quest • 16K followers
These two AI-native organizations bring together exceptional talent from Google DeepMind and Google, infusing Uniphore’s Business AI Cloud with breakthrough capabilities in Large Action Models, neuro-symbolic reasoning, and enterprise-grade agent orchestration. Umesh Sachdev, CEO and Co-founder of Uniphore, stated, “The world’s largest companies trust Uniphore to deliver innovation at the speed of AI. Our customers are betting their business models on AI-enabled transformation, with Business AI Cloud at the core.” This acquisition underscores Uniphore’s dedication to rapidly integrating world-class research and engineering expertise, delivering innovations that elevate complex workflow automation. This development addresses a crucial challenge enterprises have faced: deploying AI agents beyond simple chat and predictions. Orby AI’s expertise in Large Action Models and neuro-symbolic reasoning, combined with Autonom8’s mastery in multi-agentic workflows and hyperautomation, enables automation of complex processes previously deemed un-automatable. These technologies leapfrog traditional generative AI tools, offering precision, reasoning, and judgment at enterprise scale. Uniphore’s sovereign, composable, and secure Business AI Cloud platform serves as the ideal foundation for this innovation. The platform’s unique architecture connects enterprise data seamlessly, fine-tunes AI models, and orchestrates AI agents with unprecedented reliability and speed. As Sachdev emphasizes, “With the addition of Orby and Autonom8, Uniphore will welcome breakthrough AI capabilities that elevate our ability to orchestrate complex workflows.” From a strategic perspective, this move cements Uniphore’s position in the rapidly expanding enterprise AI agent market, projected to grow exponentially in the coming years. The acquisition enriches Uniphore’s capacity to deliver measurable business outcomes, improving customer experience, operational efficiency, and ROI through intelligent automation. Looking ahead, Uniphore plans to launch early access programs later this year, enabling select enterprise customers to experience these advancements firsthand. This phased approach ensures both innovation agility and enterprise readiness. In summary, Uniphore’s acquisitions of Orby AI - A Uniphore Company and Autonom8 Inc. signify a new era for enterprise AI, blending cutting-edge research with practical workflows to redefine business automation on a global scale. https://lnkd.in/gtubKiBB #Uniphore #BusinessAI #EnterpriseAutomation #LargeActionModels #NeuroSymbolicAI #Hyperautomation #AIInnovation #CustomerExperience #AgenticAI #AITransformation
7
-
Jeff Kushner
IT-Harvest • 6K followers
In today's interconnected business world, relying on manual processes for Third-Party Risk Management ( #TPRM ) is like leaving your front door open. That's why AI-driven automated TPRM isn't just a "nice-to-have" – it's a strategic imperative! Leave the heavy lifting, additional resource requirements and budget behind. Don't let third-party risks become your organization's Achilles' heel. Embrace the power of AI-driven automation for a more secure, efficient, and resilient future. Automating your TPRM brings immense business benefits, including : Enhanced Security Posture: Proactively identify and mitigate risks from vendors, partners, and suppliers before they impact your organization. AI can analyze vast datasets to spot anomalies and potential vulnerabilities far faster than humans can. Increased Efficiency & Cost Savings: Say goodbye to time-consuming manual assessments and paperwork. Automation streamlines workflows, reduces human error, and frees up your team to focus on higher-value strategic initiatives. Improved Compliance & Audit Readiness: Stay ahead of evolving regulations with automated tracking and reporting. AI-powered TPRM ensures consistent adherence to policies, making audits a breeze and reducing the risk of hefty fines. Faster Business Velocity: Onboard new third parties more quickly and securely, accelerating your business operations without compromising on risk. Better Decision-Making: Gain real-time, actionable insights into your third-party ecosystem, allowing for more informed and data-driven risk decisions. #ThirdPartyRisk #RiskManagement #Cybersecurity #AI #Automation #VendorRisk #GRC #Compliance
8
1 Comment -
ARISE GTM
1K followers
GTM Isn’t Broken, It’s Misaligned In SaaS and FinTech, most GTM failures don’t come from bad ideas. They come from good teams working in isolation. Marketing hits MQL targets. Sales chases their own priorities. CS fights churn. Individually, they’re winning. Together, the revenue plan is off course. GTM engineering changes that. It builds a single operating system for growth where: 1. Data and definitions are consistent across every function. 2. Hand-offs are automated and invisible to the customer. 3. AI and automation remove friction before it slows deals. The payoff? Predictable revenue, faster time-to-market, and teams that can scale without burning out. If your GTM motion is struggling, don’t throw more tactics at it, engineer it to run as one machine. Read the full article here - https://bit.ly/4124StX #GTMEngineering #RevenueGrowth #RevOps #SaaS #FinTech
-
Rikki Wright
Open Security, Inc. • 1K followers
Recent cyber attacks are a reminder of how quickly the threat landscape can shift. Our CIO Matthew Toussain shares his perspective on what security leaders should be paying attention to and timely insights as cyber conflict continues to take new forms.
5
-
Eran Tsur
Memcyco • 7K followers
Great insight from Miguel Navarro ! Addressing #ATO at scale depends on shared accountability across regulators, technology leaders, and the organizations that safeguard digital trust. If reducing account-takeover fraud earlier in the attack chain is a priority, let’s connect. https://lnkd.in/d26Biv9b
5
1 Comment -
Valence Security
8K followers
🌐 SaaS sprawl isn’t happening in one place—it’s being adopted, connected, and managed across every corner of the business. In this clip from The Professional CISO Show, Valence CEO & Co-founder Yoni Shohet joins David Malicoat at CISO XC DFW to discuss why unmanaged SaaS growth creates risks most organizations never see coming. The problem? Each new connection, integration, or shadow app can become an open door for attackers—unless you have full visibility and control. 📺 https://lnkd.in/eAzHnJ5K 🎧 Full episode: https://lnkd.in/eaDnvpYh #saassecurity #sspm #ciso #cybersecurity #infosec #thpc
21
-
Karen Buffo
2K followers
Your development team deserves better than endless security bottlenecks. Veracode's AI-powered SAST doesn't just find issues—it shows developers exactly how to fix them, right in their workflow. ✅ Faster remediation ✅ Fewer security debt cycles ✅ Happier developers See how industry leaders are transforming their secure development practices with Veracode's award-winning platform. #SecureCoding #DevSecOps #ApplicationSecurity #SAST
9
-
Shira Rubinoff✔
The Cybersphere Group • 46K followers
Great to conversation with Amit Elazari, Dr. J.S.D, CEO & Co-Founder of OpenPolicy at the Billington CyberSecurity Summit. In today’s fast-shifting landscape, if you don’t speak policy, you miss half the reason your customers buy. From #AI to #ZeroTrust, policy drives demand — and staying ahead is essential. 🔴 FULL episode here 👇👇👇👇 https://lnkd.in/eq9tqi2k #GovTech #CyberSecurity #PolicyAI #CloudSecurity #DataProtection #FedRAMP #AIAdoption Irina Denisenko Knox Systems, Inc. The Cybersphere Group Shira Rubinoff✔
71
14 Comments -
Zylo
15K followers
The average organization underestimates its SaaS footprint by 2-3x. That’s a lot of surprise renewals, shadow IT, and wasted spend hiding in plain sight. The solution? Continuous SaaS discovery. Not a one-time audit. Not a spreadsheet exercise. ✅ Real-time visibility into every app ✅ Automated tracking (no more chasing down departments) ✅ Insights to take action before waste piles up Bottom line: You can’t manage what you can’t see. Dive deeper into why SaaS discovery is the foundation of effective SaaS Management: https://lnkd.in/gYyczEHu
2
-
Alok K. Agrawal
Agrawal Capital, LLC • 6K followers
Tech M&A continues to heat up, and the $25 billion acquisition of CyberArk by Palo Alto Networks could mark one of the most significant moves yet. At first glance, it’s easy to focus on the size of the deal. But the more important story is the strategy behind it. CyberArk is a clear leader in identity and privileged access management — two areas that are becoming mission-critical as enterprises push deeper into cloud, AI, and zero-trust architectures. Identity is quickly becoming the new perimeter, and this acquisition would give Palo Alto the missing piece to round out its platform: network, cloud, AI, and now identity. This isn’t an isolated move. We’ve seen the same pattern across the industry: Cisco acquiring Splunk, HPE going after Juniper, IBM buying HashiCorp, and Alphabet snapping up Wiz. These deals aren’t about hype or momentum. They reflect a deliberate shift toward consolidation — driven by enterprise customers who are tired of managing dozens of vendors and are now looking for integrated, end-to-end solutions. M&A, when done right, isn’t about chasing the next big thing. It’s about staying consistent, executing against a clear strategy, and building capabilities over time. The most successful companies aren’t just making big acquisitions — they’re making the right ones, with purpose. Consolidation isn’t going away. If anything, we’re entering a phase where it becomes the dominant model for growth in enterprise tech. Read more here: https://lnkd.in/gfFDaVsC #MergersAndAcquisitions #Strategy #EnterpriseTech #Cybersecurity #IdentitySecurity #GrowthStrategy #TechNews #CorporateDevelopment #ZeroTrust
4
-
Martin Vickery
Information Security Media… • 2K followers
Ventura County Deputy CIO and CyberEdBoard member Gary Gooden, BSc., MBA, CISM, ZTSX-I shares why strong problem statements and effective storytelling are critical to gaining stakeholder buy-in, strengthening identity and access management, and building resilient, modern infrastructure. Watch this Profiles in Leadership conversation from the Gartner IAM Summit to hear how consistent delivery, clear communication, and trust drive real transformation across public-sector ecosystems. Watch the full interview: https://lnkd.in/dy53PBHq #CyberEdBoard #Leadership #IdentityManagement #CyberResilience #PublicSectorIT #CIO #DigitalTransformation #IAM
5
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content