Look for any podcast host, guest or anyone
Showing episodes and shows of

Rohyt Belani

Shows

Not Another CEO PodcastNot Another CEO PodcastLeading Through Change - Rohyt Belani - PhishMe - Episode #38What happens when a cybersecurity expert pioneers a new approach to phishing defense? Join us as we delve into the journey of Rohyt Belani, Co-Founder and Former CEO of PhishMe, who turned a simple idea into a $400 million exit to BlackRock. Rohyt discusses his unique business strategies, the importance of an employee-first culture, navigating massive challenges, and raising capital efficiently. Watch now to gain invaluable entrepreneurial insights from one of the leading minds in cybersecurity. Takeaways:Bootstrapping to Success: Rohyt discusses how he and his co-founder bootstrapped the company to...2025-04-0858 minLouis Lehot Legal PodcastsLouis Lehot Legal PodcastsIn House Warrior: Garage2Global with Rohyt Belani, CEO of Cofense with cohosts Louis Lehot of Foley & Lardner LLP and Richard Levick and Ian Lipner of LEVICKGarage to Global: Why do some startup companies achieve hyper success? Join Louis Lehot, a Silicon Valley lawyer and Business Lawyer & Partner at Foley & Lardner LLP with co hosts Richard Levick and Ian Lipner of LEVICK for this new weekly program with our inaugural guest, serial entrepreneur Rohyt Belani, founder and CEO of Cofense on where his best ideas come from, how they find talent and how they grow. ouis Lehot is a corporate, securities and M&A lawyer in the San Francisco Bay Area. He helps form, fund, buy and sell businesses. Feel free...2021-01-0834 minLouis Lehot Legal PodcastsLouis Lehot Legal PodcastsIn House Warrior: Garage2Global with Rohyt Belani, CEO of Cofense with cohosts Louis Lehot of Foley & Lardner LLP and Richard Levick and Ian Lipner of LEVICKGarage to Global: Why do some startup companies achieve hyper success? Join Louis Lehot, a Silicon Valley lawyer and Business Lawyer & Partner at Foley & Lardner LLP with co hosts Richard Levick and Ian Lipner of LEVICK for this new weekly program with our inaugural guest, serial entrepreneur Rohyt Belani, founder and CEO of Cofense on where his best ideas come from, how they find talent and how they grow.ouis Lehot is a corporate, securities and M&A lawyer in the San Francisco Bay Area. He helps form, fund, buy and sell businesses.2021-01-0834 minGovernment Information Security PodcastGovernment Information Security PodcastRansomware: Healthcare Fights BackMedStar is but the latest healthcare entity to fall victim to a ransomware attack. What can organizations do proactively to improve their ransomware defenses and response? PhishMe CEO Rohyt Belani offers insight.2016-04-0100 minHealthcare Information Security PodcastHealthcare Information Security PodcastRansomware: Healthcare Fights BackMedStar is but the latest healthcare entity to fall victim to a ransomware attack. What can organizations do proactively to improve their ransomware defenses and response? PhishMe CEO Rohyt Belani offers insight.2016-04-0100 minCareers Information Security PodcastCareers Information Security PodcastRansomware: Healthcare Fights BackMedStar is but the latest healthcare entity to fall victim to a ransomware attack. What can organizations do proactively to improve their ransomware defenses and response? PhishMe CEO Rohyt Belani offers insight.2016-04-0100 minInfo Risk Today PodcastInfo Risk Today PodcastRansomware: Healthcare Fights BackMedStar is but the latest healthcare entity to fall victim to a ransomware attack. What can organizations do proactively to improve their ransomware defenses and response? PhishMe CEO Rohyt Belani offers insight.2016-04-0100 minData Breach Today PodcastData Breach Today PodcastRansomware: Healthcare Fights BackMedStar is but the latest healthcare entity to fall victim to a ransomware attack. What can organizations do proactively to improve their ransomware defenses and response? PhishMe CEO Rohyt Belani offers insight.2016-04-0100 minCredit Union Information Security PodcastCredit Union Information Security PodcastRansomware: Healthcare Fights BackMedStar is but the latest healthcare entity to fall victim to a ransomware attack. What can organizations do proactively to improve their ransomware defenses and response? PhishMe CEO Rohyt Belani offers insight.2016-04-0100 minBanking Information Security PodcastBanking Information Security PodcastRansomware: Healthcare Fights BackMedStar is but the latest healthcare entity to fall victim to a ransomware attack. What can organizations do proactively to improve their ransomware defenses and response? PhishMe CEO Rohyt Belani offers insight.2016-04-0100 minBlack Hat Briefings, Las Vegas 2006 [Video] Presentations from the security conferenceBlack Hat Briefings, Las Vegas 2006 [Video] Presentations from the security conferenceChuck Willis : Web application Incident Response and forensics- A Whole new ball game.Web applications are normally the most exposed and the most easily compromised part of an organization's network presence. This combination requires that organizations be prepared for web application compromises and have an efficient plan for dealing with them. Unfortunately, traditional techniques for forensics and incident response do not take into account the unique requirements of web applications. The multi-level architecture, business criticality, reliance on major database and middleware software components, and custom nature of web applications all create unique challenges for the security professional. Responding to a web application attack brings many unique issues, often with no clear right and...2006-06-0500 minBlack Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conferenceBlack Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conferenceChuck Willis : Web application Incident Response and forensics- A Whole new ball game."Web applications are normally the most exposed and the most easily compromised part of an organization's network presence. This combination requires that organizations be prepared for web application compromises and have an efficient plan for dealing with them. Unfortunately, traditional techniques for forensics and incident response do not take into account the unique requirements of web applications. The multi-level architecture, business criticality, reliance on major database and middleware software components, and custom nature of web applications all create unique challenges for the security professional. Responding to a web application attack brings many unique issues, often with no clear right and...2006-06-0500 minBlack Hat Briefings, USA 2007 [Video] Presentations from the security conference.Black Hat Briefings, USA 2007 [Video] Presentations from the security conference.Rohyt Belani & Keith Jones: Smoke 'em Out!Tracing a malicious insider is hard; proving their guilt even harder. In this talk, we will discuss the challenges faced by digital investigators in solving electronic crime committed by knowledgeable insiders. These challenges will be presented in light of three real world investigations conducted by the presenters. The focus of this talk will on the technicalities of the attacks, the motivation of the attackers, and the response techniques used by the investigators to solve the respective crimes. The first case is the high-profile U.S. v Duronio trial, in which Keith Jones testified as the DoJ?s computer...2006-01-1000 minBlack Hat Briefings, USA 2007 [Audio] Presentations from the security conference.Black Hat Briefings, USA 2007 [Audio] Presentations from the security conference.Rohyt Belani & Keith Jones: Smoke 'em Out!Tracing a malicious insider is hard; proving their guilt even harder. In this talk, we will discuss the challenges faced by digital investigators in solving electronic crime committed by knowledgeable insiders. These challenges will be presented in light of three real world investigations conducted by the presenters. The focus of this talk will on the technicalities of the attacks, the motivation of the attackers, and the response techniques used by the investigators to solve the respective crimes. The first case is the high-profile U.S. v Duronio trial, in which Keith Jones testified as the DoJ?s computer...2006-01-101h 20