Helen Yu的动态

查看Helen Yu的档案,图片

CEO @Tigon Advisory Corp. | Host of CXO Spice | Board Director |Top 50 Women in Tech | AI, Cybersecurity, FinTech, Insurance, Industry40, Growth Acceleration

How do cybersecurity leaders balance privacy and security? Day 2 of #BlackHat kicked off with an insightful keynote on this very topic. Moxie Marlinspike, the co-founder of Signal, and Jeff Moss, the founder of Black Hat explored the future of privacy. Moxie’s “Harry Potter” analogy for learning environments resonated with me.?I share his sentiment about school and the need to create spaces where innovation and growth can thrive Key Takeaways from the Keynote: ? Balancing Act: They explored the choices involved in balancing privacy with security and shared real-world examples and strategies for navigating tradeoffs.? ? Data Protection: They emphasized the importance of safeguarding personal information and the responsibilities of developers and cyber leaders in this mission. ? Privacy as Progress: They highlighted privacy's essential role in enabling social change and offered insights into shaping a more secure and private digital future. Meeting with Commvault Reconnecting with Commvault was a highlight since they were a customer during my time at Adobe. Kevin Komiega and David Cunningham provided an overview of Commvault’s evolution. Gartner has just named Commvault a Leader for the 13th consecutive time in Enterprise Backup and Recovery Software Solutions. This recognition is based on their Completeness of Vision and Ability to Execute. Commvault Cloud SaaS-delivered solutions are now a #FedRAMP high authorized data protection offering. Their "3R" cyber resilience framework—Risk, Readiness, and Recovery—aligns with the #NIST framework and demonstrates how their solutions fit into the end-to-end value chain of cyber resilience. Commvault has been expanding its cybersecurity ecosystem and partnering with Acante, Dasera, Google Cloud, Splunk, and Wiz. David Cunningham highlighted their strategic partnership with Splunk in this short video: ? Splunk operational plug-in verifies webserver credentials and monitors data protection and retrieves client data via Commvault API. ? Splunk SOAR integration enhances security operations by sending threat detection, data security, and backup intelligence directly to Commvault.?It enriches the detail and context of security events and makes it easier for Security Operations (SecOps) to identify and respond to critical incidents. As Commvault puts it, “True cyber resilience starts before the attack—and never ends.” That’s the heartbeat of effective cybersecurity: continuous vigilance and adaptation. Subscribe to the #CXOSpice newsletter (https://lnkd.in/gy2RJ9xg) for more comprehensive #BlackHat recaps and check out the #CXOSpice YouTube channel (https://lnkd.in/gnMc-Vpj) for the upcoming episode on “State of Cybersecurity” with Splunk and “Cyber Resilience” with Commvault. #BHUSA #Cybersecurity #AI #CISO #RiskManagement #Governance

Riaz Hussain

Sales And Marketing Specialist @ Self Employed | Master of Architecture

2 个月

Thanks for sharing

Aaron Lax

Info Systems Coordinator, VP of Klover AI, Technologist and Futurist, Thinkers360 Thought Leader and CSI Group Founder. Manage The Intelligence Community and The Dept of Homeland Security LinkedIn Groups. Advisor

2 个月

Commvault is a great product, hope you had a good meeting with them Helen

Ify Abasilim

Business Growth Strategist || I help your business grow and succeed by driving sales and cutting costs || Copy and Content Writer

2 个月

Balancing privacy and security is indeed a delicate act, and it’s fascinating to see leaders like Moxie Marlinspike and Jeff Moss tackle these challenges head-on. The emphasis on privacy as a driver for social change and the evolving strategies for data protection are critical in today’s digital landscape. Commvault's continuous innovation and strategic partnerships, especially with their '3R' cyber resilience framework, show their commitment to staying ahead of the curve. Exciting times for cybersecurity!

Alax Kaur

Real Estate Agent at Alax Real Estate specializing in real estate sales

2 个月

The continuous vigilance and adaptation emphasized by Commvault are essential for effective cybersecurity. It’s a constant battle that never truly ends.

Manuel Barragan

I help organizations in finding solutions to current Culture, Processes, and Technology issues through Digital Transformation by transforming the business to become more Agile and centered on the Customer (data-driven)

2 个月

Balancing privacy and security is a complex tightrope walk, Helen Yu. Organizations must prioritize data protection without stifling innovation.

Harshita Porwal

Helping People To Uplift

2 个月

The CXOSpice newsletter and YouTube channel are great resources for staying updated on cybersecurity trends. Looking forward to more insights from these platforms.

Michael Haltman, Hallmark Abstract Service

CEO, Hallmark Abstract Service (New York Title Insurance); Board Chair Combat Veteran Heroes To Heroes Foundation; Podcast Host 'Do You Ever Wonder?'

2 个月

It's a balancing act Helen Yu, but stories like this one seem to indicate that better security needs to take precedence...'Nearly three billion individuals had their personal data leaked during a cyber attack targeting National Public Data (NPD), a background checking service also known as Jerico Pictures.'

Bob Carver

CEO Cybersecurity Boardroom ? | CISSP, CISM, M.S.

2 个月

Let’s hope more companies strike an appropriate balance between privacy and security.

Dr. Martha Boeckenfeld

CEO & Founder, Top 100 Women of the Future | AI, Web3, Metaverse - Advisor & Deep Tech Impact Investor | Keynote Speaker | Masterclass | Leading Human-Centric Tech for Global Change

2 个月

Thanks Helen, Commvault is an excellent product. Cybersecurity is the hottest topic for all companies! Thanks for sharing your insights.

C.P. Maheshwari

Designer at Ashram Foundation - India

2 个月

Moxie and Jeff Moss’s insights into navigating tradeoffs between privacy and security are incredibly valuable for anyone in the cybersecurity space.

查看更多评论

要查看或添加评论,请登录