
Sign up to save your podcasts
Or


All links and images for this episode can be found on CISO Series.
Check out this post for the discussion that is the basis of our conversation on this week's episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap), CISO, LinkedIn. Joining me is our guest, Mike Levin, deputy CISO, 3M.
In this episode:
Why do security startups fail?
All startups are an inherently risky proposition, but what are the specific challenges for startups in our industry?
What's unique about cybersecurity startups?
What's the most common reason you've seen a cyber startup not succeed?
Thanks to our podcast sponsor, RevealSecurity!
Reveal Security ITDR detects identity threats - post authentication - in and across SaaS applications and cloud services. Powered by unsupervised machine learning, it continuously monitors and validates the behavior of trusted human users, APIs and other entities, accurately detecting anomalies that signal an in-progress identity threat. Visit reveal.security
By David Spark, Steve Zalewski, Geoff Belknap4.8
7373 ratings
All links and images for this episode can be found on CISO Series.
Check out this post for the discussion that is the basis of our conversation on this week's episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap), CISO, LinkedIn. Joining me is our guest, Mike Levin, deputy CISO, 3M.
In this episode:
Why do security startups fail?
All startups are an inherently risky proposition, but what are the specific challenges for startups in our industry?
What's unique about cybersecurity startups?
What's the most common reason you've seen a cyber startup not succeed?
Thanks to our podcast sponsor, RevealSecurity!
Reveal Security ITDR detects identity threats - post authentication - in and across SaaS applications and cloud services. Powered by unsupervised machine learning, it continuously monitors and validates the behavior of trusted human users, APIs and other entities, accurately detecting anomalies that signal an in-progress identity threat. Visit reveal.security

186 Listeners

2,007 Listeners

372 Listeners

371 Listeners

651 Listeners

1,020 Listeners

319 Listeners

416 Listeners

8,064 Listeners

179 Listeners

315 Listeners

189 Listeners

139 Listeners

44 Listeners

168 Listeners