Jason Mitchell, Senior Vice President of Engineering at Delinea, joins Tech 2 Exec to discuss how identity-based security strengthens enterprise defense strategies. The conversation covers how privilege management reduces risk, why identity now defines the perimeter, and what IT leaders need to consider as AI and automation reshape access control. Learn more about Deline at www.delinea.com.
Tim MalcomVetter shares his experience leading red and blue teams, including Walmart’s red team, which shaped a new way of thinking about Managed Detection and Response (MDR). He explains why speed, validation, and operational alignment matter more than ever in cybersecurity. Learn more about Wirespeed by visiting www.wirespeed.co.
What does it take to lead in cybersecurity when the challenges never stop changing? Expel CEO Dave Merkel shares stories from his career and how those experiences shaped his approach to leadership. The conversation explores the realities of working on both sides of the cybersecurity table and what executives should know when building stronger connections with IT and security teams. If you’re interested in leadership, cybersecurity strategy, or the future of vendor and customer relationships, this episode is for you. Learn more about Expel at: www.expel.com.
What does it look like when AI becomes a true teammate in cyber defense? Jack Miller of Darktrace joins Tech 2 Exec to talk about the role of AI in spotting the threats humans can’t, why resilience matters more than just prevention, and how executives can better understand and manage cyber risk. From his years as a CISO to his work at Darktrace, Jack shares how security leaders can balance people, process, and technology in a world where attackers are moving faster than ever. Learn more about Darktrace at www.darktrace.com, or read the blog featured in the podcast here.
Sanjay Poonen, CEO of Cohesity, shares his story — from his early beginnings to leading Cohesity, a company recognized as a leader in enterprise data protection. He joins Mike and Josh to talk about the values that have shaped his leadership, Cohesity’s growth, and how customers are getting more from their data. The discussion also touches on AI, building a global brand, and what lasting leadership looks like in practice. Learn more about Cohesity by visiting: www.cohesity.com
Data protection is a business conversation, not just an IT task. Arcserve’s Chief Product and Technology Officer Michael Lin explains why executives need to understand the risks of ransomware, downtime, and recovery gaps, and how IT leaders can communicate these issues in a way that drives action. Learn more about Arcserve by visiting: www.arcserve.com
Most security teams still can’t answer a fundamental question: where is our sensitive data, and who has access to it? In this episode of Tech 2 Exec, Karthik Krishnan, CEO of Concentric AI, joins Mike and Josh to explain why discovery is still broken—and how their context-aware language models are helping organizations operationalize data security in a way that actually works. Learn more about Concentric AI at www.concentric.ai.
Mike and Josh interview Paul Whittier, Principal Cybersecurity Adviser at Adlumin, to challenge the myth that smaller organizations aren’t on attackers’ radar and how to outline a practical first-step security plan. From using NIST as a clear roadmap and meeting insurance-driven controls, to patching, immutable backups, 24×7 monitoring, and user training, Paul shows why funding prevention now beats paying for recovery later. Learn more about Adlumin at www.adlumin.com.
Mike and Josh Linton sit down with AssetWorx founder Alex Hill to uncover the overlooked risks of improper IT asset disposition (ITAD). From forgotten data sitting in warehouses to the environmental and compliance pitfalls of hardware disposal, Alex explains why ITAD deserves executive attention. He shares how AssetWorx helps organizations secure data, recover value, and avoid the fallout of unchecked ITAD.
Mike and Josh Linton sit down with Armis CTO Vinod Brahmapuram to explore rising cyber threats and the importance of asset visibility. He shares how Armis equips organizations to stay ahead of disruptions and close leadership gaps in cyber risk.
Copyright VLCM | All Rights Reserved | Privacy