Log in

goodpods headphones icon

To access all our features

Open the Goodpods app
Close icon
ITSPmagazine Podcasts - Their Story | OPSWAT | A Conversation With Benny Czarny | RSA Conference 2020

Their Story | OPSWAT | A Conversation With Benny Czarny | RSA Conference 2020

03/10/20 • 26 min

ITSPmagazine Podcasts

This contains promotional content. Learn more.

A journey that began with establishing the de-facto cybersecurity language has lead OPSWAT to protecting our critical infrastructure.

Before we get to the start of this story, our journey here begins with a view of the current moment in time: OPSWAT’s focus on protecting our critical infrastructure.

As more systems and services come online throughout the entities that operate our critical infrastructure businesses and services, the question that doesn’t get asked enough, it seems to be: “What is the process for transferring data into, and out of, your network?”

You might be surprised (or, maybe not) that several organizations that the OPSWAT team has connected with don’t have a decent answer to this question, with many lacking any policy to define what is appropriate vs. what shouldn’t be allowed. Something as simple as the introduction of a malicious Excel spreadsheet that bypasses the antivirus sandbox capabilities can create a situation where a power plant can be taken offline.

During our conversation with Benny Czarny, CEO, and founder of OPSWAT, we dig into this topic, once we hear about his and the company’s story.

Amongst many other things, we talk about:

  • The founding of the company and how they developed their first minimum viable product (MVP)
  • How the team was created, how the culture was established, and what it takes to promote strong retention
  • The importance of transparency, trust, and making mistakes
  • How do the team measures success, both internally and outward-facing
  • The vision for the future of OPSWAT; what the next 20 years might bring

What does the future hold for securing our critical infrastructure?

Listen to Benny as he enlightens us during this friendly meeting.

Guest(s)
Benny Czarny

Resources
Learn more about their company and their offering: https://itspm.ag/opswitspdir

For more stories from RSA Conference 2020, be sure to visit https://www.itspmagazine.com/rsa-conference-usa-2020-rsac-san-francisco-coverage

Are you interested in telling your story?
https://www.itspmagazine.com/telling-your-story

plus icon
bookmark

This contains promotional content. Learn more.

A journey that began with establishing the de-facto cybersecurity language has lead OPSWAT to protecting our critical infrastructure.

Before we get to the start of this story, our journey here begins with a view of the current moment in time: OPSWAT’s focus on protecting our critical infrastructure.

As more systems and services come online throughout the entities that operate our critical infrastructure businesses and services, the question that doesn’t get asked enough, it seems to be: “What is the process for transferring data into, and out of, your network?”

You might be surprised (or, maybe not) that several organizations that the OPSWAT team has connected with don’t have a decent answer to this question, with many lacking any policy to define what is appropriate vs. what shouldn’t be allowed. Something as simple as the introduction of a malicious Excel spreadsheet that bypasses the antivirus sandbox capabilities can create a situation where a power plant can be taken offline.

During our conversation with Benny Czarny, CEO, and founder of OPSWAT, we dig into this topic, once we hear about his and the company’s story.

Amongst many other things, we talk about:

  • The founding of the company and how they developed their first minimum viable product (MVP)
  • How the team was created, how the culture was established, and what it takes to promote strong retention
  • The importance of transparency, trust, and making mistakes
  • How do the team measures success, both internally and outward-facing
  • The vision for the future of OPSWAT; what the next 20 years might bring

What does the future hold for securing our critical infrastructure?

Listen to Benny as he enlightens us during this friendly meeting.

Guest(s)
Benny Czarny

Resources
Learn more about their company and their offering: https://itspm.ag/opswitspdir

For more stories from RSA Conference 2020, be sure to visit https://www.itspmagazine.com/rsa-conference-usa-2020-rsac-san-francisco-coverage

Are you interested in telling your story?
https://www.itspmagazine.com/telling-your-story

Previous Episode

undefined - Their Story | Silverfort | A Conversation With Dana Tamir | RSA Conference 2020

Their Story | Silverfort | A Conversation With Dana Tamir | RSA Conference 2020

This contains promotional content. Learn more.

Access control should be about keeping people out as much as ensuring easy access to those with authorization to enter

During RSA Conference, we had a chance to connect with Dana Tamir from Silverfort to get the updated Silverfort story. During our chat, Dana points out that enabling secure authentication and zero trust policies without requiring an agent or proxies or software changes should be the primary goal for organizations looking to keep bad actors out while ensuring secure access to those that have been granted authorized access to the business resources.

This rule of thumb shouldn’t necessarily change just because of the criticality and sensitivity of the resources being accessed—and it shouldn’t be thrown out the window just because systems, services, and applications are being used via APIs.

Ultimately, it boils down to the behavior of the users and the actions they are taking to access everything they need to do their job. If the behavior looks suspicious if the activities present a situation where the user may be compromised, or if the behavior suggests that the user is operating as a bot, then the authentication request(s) can be challenged with additional methods of proof.

During our chat, Dana provides some use cases and workflows to help demonstrate the scenarios above. How many of these scenarios does your organization deal with? Have a listen to learn more.

Guest(s)
Dana Tamir

Resources
Learn more about their company and their offering: https://itspm.ag/itspslvrdir

For more stories from RSA Conference 2020, be sure to visit https://www.itspmagazine.com/rsa-conference-usa-2020-rsac-san-francisco-coverage

Are you interested in telling your story?
https://www.itspmagazine.com/telling-your-story

Next Episode

undefined - Their Story | DomainTools | A Conversation With Corin Imai | RSA Conference 2020

Their Story | DomainTools | A Conversation With Corin Imai | RSA Conference 2020

This contains promotional content. Learn more.

The company telling their story to us today is DomainTools.

Guest(s)
Corin Imai

Resources
Learn more about their company and their offering: https://itspm.ag/2IyLVGz

For more stories from RSA Conference 2020, be sure to visit https://www.itspmagazine.com/rsa-conference-usa-2020-rsac-san-francisco-coverage

Are you interested in telling your story?
https://www.itspmagazine.com/telling-your-story

Episode Comments

Generate a badge

Get a badge for your website that links back to this episode

Select type & size
Open dropdown icon
share badge image

<a href="https://goodpods.com/podcasts/itspmagazine-podcasts-3754/their-story-opswat-a-conversation-with-benny-czarny-rsa-conference-202-9494770"> <img src="https://storage.googleapis.com/goodpods-images-bucket/badges/generic-badge-1.svg" alt="listen to their story | opswat | a conversation with benny czarny | rsa conference 2020 on goodpods" style="width: 225px" /> </a>

Copy