logo
episode-header-image
Jan 2021
45m 49s

Living on the Edge: How Netskope is Rede...

MISSION
About this episode

When Netskope CEO and founder Sanjay Beri left his role with well-known Juniper Networks, he knew the internet and the way that we protected ourselves virtually was changing. The issue is that while Sanjay knew companies needed to leave their old security tactics behind, convincing members of the C-Suite that they needed to invest in new security measures is a very difficult task. So he showed them why.

“Without them telling us anything, we basically uncovered all their shadow IT, all their data that was being filtered not by malicious people, but by their own employees who just didn't know better,” he said. “It's so apparent that people don't know where their data is and by showing them where their data is they realize how exposed they really are.”

Sanjay is working to make security more proactive, less reactive, and more educational via his new venture with Netskope. On this episode of IT Visionaries, Sanjay discusses how companies can uplevel their security techniques, why SaaS applications are leaving your data unprotected and exposed in areas you might not realize, and why it’s time security companies start educating their peers on best practices.

Main Takeaways

  • Lost in Translation: Every 10 to 15 years, the language of the internet changes. As that happens, your SaaS application must change with it. Software that is 15 years old, is unable to understand the new intricacies of the internet, which leaves companies and users vulnerable to various threats.
  • Living on the Edge: Your security needs to live where your employees reside — which recently is at the edge — so that no matter where employees work, your system is there to protect them. With so many employees working remotely in 2021, most of a company’s data and documents are living in the cloud, even if your company is not cloud-native, so necessary security needs to be put in place to protect it.
  • Here to Educate and Protect: Security teams have a responsibility to not only protect their end-users, but they also must be educating the end-users on why and how they are putting themselves at risk. The purpose of this educational philosophy is so that users can understand the risks once they have been briefed, and you can then take action to minimize risk.

IT Visionaries is brought to you by the Salesforce Platform - the #1 cloud platform for digital transformation of every experience. Build connected experiences, empower every employee, and deliver continuous innovation - with the customer at the center of everything you do. Learn more at salesforce.com/platform

Up next
Yesterday
Cisco’s Vijoy Pandey: The New Internet, AI Agents, and Quantum Networks
Cisco’s Vijoy Pandey - SVP & GM of Outshift by Cisco - explains how AI agents and quantum networks could completely redefine how software, infrastructure, and security function in the next decade.You’ll learn:→ What “Agentic AI” and the “Internet of Agents” actually are→ How Cisc ... Show More
1h 1m
Sep 25
3 Biggest Cybersecurity Threats & What IT Leaders Need To Know
Cybersecurity isn’t just about firewalls and passwords anymore. It’s an all-out battle where hackers run businesses with customer support desks, insider threats can be disguised as your newest hire, and artificial intelligence is both the weapon and the shield. In this special ep ... Show More
36m 4s
Sep 18
$124B Data Problem: How Synthetic Data Accelerates AI
When your AI has to make decisions in the real world, the data you don’t have can hurt people. DiffuseDrive CEO Balint Pasztor joins IT Visionaries to unpack the $124B data scarcity problem holding back autonomous systems — and how synthetic data (done right) can compress years o ... Show More
45m 13s
Recommended Episodes
Dec 2021
Rediscover trust in cybersecurity: A women in cybersecurity podcast. [Special edition]
It's important for employees to be brought into the fold as security's allies, rather than as its adversaries. For cybersecurity teams that operate with an adversarial mindset appropriate for external threats, it can be challenging to approach internal threats differently. You ca ... Show More
49m 21s
Jun 2019
The so-called cloud and what it means for cyber security
What is the cloud? Is it secure? How safe is your information when it’s in the cloud? Reformed Hacker Bastien Treptel and Chief Cyber Risk Officer Fergus Brooks talk with David Kaplan from Amazon Web Services about the reliability of cloud security and what the benefits and pitfa ... Show More
20m 25s
Jan 2023
The power of web data in cybersecurity. [CyberWire-X]
The public web data domain is a fancy way to say that there is a lot of information sitting on websites around the world that is freely available to anybody who has the initiative to collect it and use it for some purpose. When you do that collection, intelligence groups typicall ... Show More
28m 57s
Apr 2020
That odd and bogus 5G meme. Malvertising. Data breach hits Pakistani mobile users. xHelper update. Data privacy and data utility. COVID-19 and cybersecurity.
The curious history of the delusion that COVID-19 has something to do with 5G. Malvertising spoofs a security company’s website. Data breach hits Pakistani mobile users. xHelper is still in circulation. Data privacy versus data utility. COVID-19-driven patterns of cybercrime. And ... Show More
26m 43s
Oct 2018
Influence operations, da. Direct hacking? Maybe nyet. Chalubo botnet borrows old tricks. Financial sector alert in Mexico. Airline breach disclosed. Lawsuits over privacy. ICS Security notes.
In today's podcast, we hear that the US Department of Homeland Security sees lower-than-expected rates of Russian election system probing even as Russian information operations continue. Sophos warns of the emergence of the Linux-based "Chalubo" botnet. Mexico's Central Bank rais ... Show More
20m 12s
Dec 2023
An internet blackout.
A cyberattack on Ukraine's largest telecom operator. Ukraine's GUR claims a hit on Russia's tax service, while the fate of the ALPHV/BlackCat group remains shrouded in mystery. The Air Force disciplines members over a classified documents breach, and Apple releases urgent securit ... Show More
32m 2s
Jul 2022
The cost of a data breach as an economic drag. Personal apps as a potential business risk. Why so little ransomware in Ukraine? Employee engagement study reaches predictably glum conclusions.
IBM reports on the cost of a data breach. Personal apps as a potential business risk. Over on the dark side, there’s help wanted in the C2C labor market. An employee engagement study reaches predictably glum conclusions. Betsy Carmelite from Booz Allen Hamilton on reducing softwa ... Show More
25m 18s
Mar 2024
2820: The Cyber Insurance Equation: Risk, Responsibility, and Readiness
In today's digital landscape, the role of cybersecurity within organizations is more critical than ever. As businesses navigate the complexities of protecting their data and infrastructure, the Chief Information Security Officer (CISO) stands at the forefront of this evolving bat ... Show More
36m 29s