logo
episode-header-image
Jan 2021
45m 49s

Living on the Edge: How Netskope is Rede...

MISSION
About this episode

When Netskope CEO and founder Sanjay Beri left his role with well-known Juniper Networks, he knew the internet and the way that we protected ourselves virtually was changing. The issue is that while Sanjay knew companies needed to leave their old security tactics behind, convincing members of the C-Suite that they needed to invest in new security measures is a very difficult task. So he showed them why.

“Without them telling us anything, we basically uncovered all their shadow IT, all their data that was being filtered not by malicious people, but by their own employees who just didn't know better,” he said. “It's so apparent that people don't know where their data is and by showing them where their data is they realize how exposed they really are.”

Sanjay is working to make security more proactive, less reactive, and more educational via his new venture with Netskope. On this episode of IT Visionaries, Sanjay discusses how companies can uplevel their security techniques, why SaaS applications are leaving your data unprotected and exposed in areas you might not realize, and why it’s time security companies start educating their peers on best practices.

Main Takeaways

  • Lost in Translation: Every 10 to 15 years, the language of the internet changes. As that happens, your SaaS application must change with it. Software that is 15 years old, is unable to understand the new intricacies of the internet, which leaves companies and users vulnerable to various threats.
  • Living on the Edge: Your security needs to live where your employees reside — which recently is at the edge — so that no matter where employees work, your system is there to protect them. With so many employees working remotely in 2021, most of a company’s data and documents are living in the cloud, even if your company is not cloud-native, so necessary security needs to be put in place to protect it.
  • Here to Educate and Protect: Security teams have a responsibility to not only protect their end-users, but they also must be educating the end-users on why and how they are putting themselves at risk. The purpose of this educational philosophy is so that users can understand the risks once they have been briefed, and you can then take action to minimize risk.

IT Visionaries is brought to you by the Salesforce Platform - the #1 cloud platform for digital transformation of every experience. Build connected experiences, empower every employee, and deliver continuous innovation - with the customer at the center of everything you do. Learn more at salesforce.com/platform

Up next
Today
Turning 90 Years of Data into AI-Powered Insights
Discover how to turn decades of data into a competitive edge, build lasting customer relationships beyond the first click, and apply AI in ways that truly drive impact. Joining us is Vineet Mahajan, CTO of US News & World Report, who shares how he’s led the 90-year-old brand thro ... Show More
37m 3s
Jun 26
What IT Leaders Can Learn from How the Government Buys Tech
IT leaders in regulated industries know the pain of navigating outdated, slow procurement systems – especially when critical missions depend on modern tools. In this episode, Bryana Tucci, Lead of the AWS Marketplace for the US Intelligence Community, shares how government agenci ... Show More
44m 4s
Jun 5
AI in Content Management | Opportunities and Challenges
Feeling buried under content chaos? You're not alone. Ravi Singh, President and Chief Product Officer at Brightspot, joins us to break down how IT leaders can regain control, cut through AI-generated noise, and build scalable, secure content systems. He shares the secrets behind ... Show More
52m 56s
Recommended Episodes
Dec 2021
Rediscover trust in cybersecurity: A women in cybersecurity podcast. [Special edition]
It's important for employees to be brought into the fold as security's allies, rather than as its adversaries. For cybersecurity teams that operate with an adversarial mindset appropriate for external threats, it can be challenging to approach internal threats differently. You ca ... Show More
49m 21s
Jun 2019
The so-called cloud and what it means for cyber security
What is the cloud? Is it secure? How safe is your information when it’s in the cloud? Reformed Hacker Bastien Treptel and Chief Cyber Risk Officer Fergus Brooks talk with David Kaplan from Amazon Web Services about the reliability of cloud security and what the benefits and pitfa ... Show More
20m 25s
Jan 2023
The power of web data in cybersecurity. [CyberWire-X]
The public web data domain is a fancy way to say that there is a lot of information sitting on websites around the world that is freely available to anybody who has the initiative to collect it and use it for some purpose. When you do that collection, intelligence groups typicall ... Show More
28m 57s
Apr 2020
That odd and bogus 5G meme. Malvertising. Data breach hits Pakistani mobile users. xHelper update. Data privacy and data utility. COVID-19 and cybersecurity.
The curious history of the delusion that COVID-19 has something to do with 5G. Malvertising spoofs a security company’s website. Data breach hits Pakistani mobile users. xHelper is still in circulation. Data privacy versus data utility. COVID-19-driven patterns of cybercrime. And ... Show More
26m 43s
Oct 2018
Influence operations, da. Direct hacking? Maybe nyet. Chalubo botnet borrows old tricks. Financial sector alert in Mexico. Airline breach disclosed. Lawsuits over privacy. ICS Security notes.
In today's podcast, we hear that the US Department of Homeland Security sees lower-than-expected rates of Russian election system probing even as Russian information operations continue. Sophos warns of the emergence of the Linux-based "Chalubo" botnet. Mexico's Central Bank rais ... Show More
20m 12s
Dec 2023
An internet blackout.
A cyberattack on Ukraine's largest telecom operator. Ukraine's GUR claims a hit on Russia's tax service, while the fate of the ALPHV/BlackCat group remains shrouded in mystery. The Air Force disciplines members over a classified documents breach, and Apple releases urgent securit ... Show More
32m 2s
Jul 2022
The cost of a data breach as an economic drag. Personal apps as a potential business risk. Why so little ransomware in Ukraine? Employee engagement study reaches predictably glum conclusions.
IBM reports on the cost of a data breach. Personal apps as a potential business risk. Over on the dark side, there’s help wanted in the C2C labor market. An employee engagement study reaches predictably glum conclusions. Betsy Carmelite from Booz Allen Hamilton on reducing softwa ... Show More
25m 18s
Mar 2024
2820: The Cyber Insurance Equation: Risk, Responsibility, and Readiness
In today's digital landscape, the role of cybersecurity within organizations is more critical than ever. As businesses navigate the complexities of protecting their data and infrastructure, the Chief Information Security Officer (CISO) stands at the forefront of this evolving bat ... Show More
36m 29s