DiscoverBeyond the Firewall
Beyond the Firewall
Claim Ownership

Beyond the Firewall

Author: shirasha

Subscribed: 0Played: 0
Share

Description

Join host Shira Shamban, a Cloud and Cybersecurity Leader and Entrepreneur, as she looks Beyond the Firewall to explore the convergence of Cloud, Cyber, and AI. In every episode, Shira is joined by a special guest expert for candid, cutting-edge discussions on the future of technology - from safeguarding data against advanced threats to harnessing artificial intelligence in the cloud.


Dive deep into the insights you need to know about the digital frontier.

3 Episodes
Reverse
From Wall Street Custody to Web3 Security: Dave Schwed on the Institutional Gap and the Future of Digital Assets   In this episode of Beyond the Firewall, we sit down with Dave Schwed, former COO of Halborn and veteran of BNY Mellon and Citigroup, to explore the collision of traditional finance and the decentralized frontier. Dave pulls back the curtain on the "institutional friction" preventing mass enterprise adoption of blockchain—explaining why traditional risk frameworks fail in a world of smart contracts, and how the next generation of custody will be defined by real-time AI defense rather than static vaults.
From CISO to Founder: Jaya Baloo on AI Remediation and the Supply Chain Crisis In this episode of Beyond the Firewall, we sit down with Jaya Baloo, former CISO of Avast and Rapid7, to discuss her high-stakes transition from defending global giants to co-founding the AI security startup AISLE. Jaya pulls back the curtain on the "expert’s dilemma" - why internal security pros are the hardest users to secure, and how geopolitical instability is permanently fracturing the global technology supply chain.
Arve Kjoelen, former CISO of McAfee and now a cyber entrepreneur, joins Shira to bridge the divide between startups and security leaders. Arve shares invaluable lessons, revealing the biggest mistakes founders make when approaching CISOs and detailing the best strategies for forging effective partnerships in today's threat landscape. 
Comments