![]() Before joining, Aaron was CRO at RangeForce and was responsible for leading the revenue generation team, including sales, engineering, operations, and more. In 2010, Matt was awarded the Presidential Meritorious Senior Career Employee.Īaron Ansari has more than 20 years of combined experience as a sales and operational leader and security practitioner. from California State Polytechnic University, and an M.S./M.B.A. He holds several commercial information security certifications, a B.S. ![]() Government Forensics Analyst in Baghdad, Iraq, and several technical leadership roles at the NSA. His military and public service includes Chief of Intelligence of the 18th Fighter Squadron (USAF), Senior Intelligence Officer to Gen. Matt implemented network security architecture for Coca Cola, Frito Lay, and Coors Brewing Company. After seventeen years as a commissioned United States Air Force officer and a Defense Department Senior Executive, he transitioned to the private sector holding positions as Chief Technical Officer for a venture backed cybersecurity firm, Senior Technical Director for Symantec Corporation’s Global Security Operations, and an Executive-in-Residence at Littoral Ventures. Matt Georgy’s extensive experience spans the private and public sector. His field experience includes numerous undercover operations in counter-narcotics, counterintelligence and counterespionage activities, as well as specialized operations as a part of the national surveillance team. ![]() Jim’s government experience includes over eleven years investigative experience as a Federal Agent, his last posting was as the Deputy Director of Computer Crime Investigations for the United States Air Force Office of Special Investigations, where he provided oversight and onsite investigation into the penetration of the Department of Defense’s systems around the globe. His commercial experience includes executive management, sales and consulting efforts at five different information security organizations, working from start-up phase through successful exits. Jim built the organization from the initial six-person team to over 540 staff members worldwide, with direct management responsibility for more than half of the staff. He helped his team create successful launches of three additional products through cross-sell / up-sell and greenfield opportunities. Jim developed initial go-to-market strategy for the first SaaS phishing simulation product, drove initial sales through early adopters to over 2,000 enterprise customers. At Cofense he was responsible to the CEO and Board of Directors for all client facing functions of the organization including sales, marketing, support, customer success and professional services. Jim specializes in developing initial go to market strategies focusing internal teams to build a highly customer centric business model that drives customer adoption and retention. ![]() Jim has also held numerous executive and management positions in both sales and consulting organizations, and regularly speaks and publishes articles on information security topics. Previously he was one of the founders and Chief Operating Officer of Mandiant where he led the go to market effort for services and product as well as providing hands on incident response services. He recently served for a decade as the President and Chief Operating Officer at Cofense driving revenue growth from $0 to over $90 million in ARR. This is done to prevent tampering with the source material.Jim Hansen has over twenty five years’ experience in sales, operations and executive management in the information security industry. This is a common practice within government agencies, especially those dealing with sensitive information and with certain legal documents that need to protect certain information but need to reveal other information in the same document. Rather than editing the source file, it is the printed copies that go to non-privileged individuals that get redacted, i.e., the information that the said individuals are not privy to is simply blacked out so as to become illegible. An example is when a certain legal document needs to be distributed to people but not all of them have the right or privilege to view certain information contained in the document, and it must be kept intact for those who do. Redaction is often done on physical printed documents and not on the source files, so it becomes more like a post edit. Today, that meaning still holds true in a sense, but in a more "edit out," obscure or remove kind of way. Redaction originally meant to literally edit and make ready for publication, at least as evidenced by its usage in the early 15th century.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |