Expert Details

Expert in Cybersecurity, Cybercrime, Cyberwarfare, Cybersecurity Technology Due Diligence, Venture Capital

Expert ID: 731552 Israel

Request Expert

Having started his career as a computer security practitioner, developing and standing up a computer security capability for a $700M enterprise, he migrated to the security software vendor side in the early days of the commercial Internet when it became clear computer security solutions were required. Today he is a branded computer security industry guru and internationally recognized expert on cyber-crime and cyber-warfare, well regarded in the broad security community, and articulate about the threat business.

Software industry leadership with responsibility over development, quality assurance and testing, localization and international product engineering, sustained engineering, SDLC and standards, and technical operations teams.

Financial acumen with experience in three publicly held companies (corporate officer at NASDQ:SYMC) including frequent exposure to analysts, investment bankers and other Wall Street intermediaries. Featured presenter at numerous investor and investment banking conferences. Keynote speaker at industry trade shows (including the RSA Security Conference) and company user events (such as CA World). Typically the primary executive spokesperson and business emissary to the field (global mandate) on security issues, solutions, strategies and vision. Frequently quoted or featured in publications, media outlets, and television and radio programs. Authored several articles and chapters in the cyber security domain.

Active in industry and government boards (sample list includes): Served on the Board of the Cyber Security Industry Alliance; Co-chaired a National Cyber Security Partnership Task Force of Security Across the Software Development Life Cycle; U.S. Delegate (at the invitation of DoJ) to the G-8 on High-Tech Crime; Conceived and organized the Java Security Alliance, a security industry consortium, that later evolved into the Common Content Inspection API security industry standards group.

Expert has been an advisor to C-level execs, boards of directors, VCs and PE firms on value-creation activities including new markets, acquisition and divestiture strategy, global sourcing of labor, major technology decisions, and eco-system development. He is a proven GM offering a unique point of view at the intersection of technology, strategy, global markets and finance and a successful high tech executive who came up through the technical and product marketing ranks, provides the big-picture and long-view.

He has had responsibility for a $150M global P&L (security software industry) where fiscal year revenue and units-shipped targets were exceeded while operating budget was delivered 5% below forecast. He is deft but firm around strategic choices and directions available to the company and is considered an innovator and puzzle-maker in the computer security industry.

Stature externally with both the financial markets and industry pundits to take a software company public in an IPO or guide it through a successful acquisition. Deft but firm around strategic choices and directions available to the company. Considered an visionary, innovator and puzzle-maker in the industry.

Expert is well-versed in the art of cross-border software development and international sales and marketing with global leadership and operational experience both inside and outside the U.S. He provides clear direction on metrics and controls developed from experience going through the pre-IPO process, leading an attempted management buy-out, and having sat in the acquirer chair and offers M&A leadership through acquisitions totaling nearly $2B, including cleaning-up and turning around two poorly-managed integrations and shutting down several unaligned product lines. On-the-ground leadership developed through executive roles at three public multinational corporations and one private high-tech startup.

Fluent in the art of communication, he has keynoted at major industry conferences, investor conferences, sales team “ra-ra” events, and customer conferences; authored articles and chapters; engaged with analysts and media; and is a proven rainmaker.

Sourced, ran diligence, developed investment thesis, and manage investments in cybersecurity and enterprise infrastructure startup and growth-stage companies. Found great companies; identified exceptional entrepreneurs and management teams; developed, justified and executed on investment thesis; helped portfolio companies grow and exit when appropriate. In addition, mentored entrepreneurs and educated general and limited partners.

Was retained to develop a strategy whereby [global semiconductor company] could influence emerging enterprise mobile security adoption patterns. The goal of the strategy was to drive product design and engineering focused on the enterprise mobile device security in order to motivate enterprise IT managers to adopt a strong bias or preference for [global semiconductor company] based Android devices over competing platforms. A set of strategic assets and priorities were identified based on external input and research. Accelerated [global enterprise software company] security business unit growth increasing billings 500% (to over $500M) by delivering software and services that enable organizations to secure, manage and govern their IT environments. Maintained the company’s technical lead in world-class information security software by shaping the strategic direction of the business, assessing and identifying new areas for organic and inorganic growth, and developing a rich partner eco-system.Was retained to evaluate an investment in [cyber security startup], a developer of enterprise personal firewalls and host intrusion prevention technology. A full technical due diligence resulted in a favorable assessment of the end-point security technology, management team, and market opportunity. Although he recommended investing, both firms passed.[cyber security startup] was sold to [global cyber security technology company] for an estimated $175M (nearly 9x TTM revenue estimates), handsomely rewarding the venture investors.Was retained to evaluate [startup company], a software company focused on integrating Bluetooth with other wireless technologies. This “diamond-in-the-rough” project was a management turn-around and re-positioning. The strategy conceived and set in motion resulted in a new investment round, a re-launch as [newco startup] with a focus on end-point security, and the acquisition of the company by [global network technology company] for an estimated $30M (about 6x TTM revenue).Was retained by [VC firm] to help evaluate an investment opportunity of an early-stage technology company focused on the emerging network intrusion prevention market. He has remained a trusted adviser to the company board, recommending a successful strategy whereby the company extended its core intrusion prevention service by embracing both network admissions control (NAC) and granular user policy enforcement so as to bring together device and user authentication and authorization.Was retained by [PE firm] to lead an investment thesis review of a privately-held, open-source web intelligence company with $25M in annual turnover. A full technical due diligence resulted in a number of flags and guidance to invest only if specific issues were resolved. As a result of the assessment, the deal was not consummated.Was retained by [Fortune 200] firm to develop a strategy for winning in the managed security services space. Strategy included primary market research, evaluation of existing solution providers, and development of a prioritized acquisition target list. Although the findings were accepted and supported by executive management, internal leadership "shake-up" derailed execution of the strategy.

Education

Year Degree Subject Institution
Year: 1996 Degree: MSE Subject: Computer Engineering Institution: Case Western Reserve University / Case Institute of Technology
Year: 1994 Degree: MBA Subject: Technology Management Institution: Case Western Reserve University / Weatherhead School of Management
Year: 1988 Degree: BA Subject: Mathematics Institution: Case Western Reserve University / Western Reserve College

Work History

Years Employer Title Department
Years: 2012 to Present Employer: Undisclosed Title: Venture Partner Department: Investments
Responsibilities:
Source, diligence and manage investments in the enterprise infrastructure software space with a specific focus on cyber security opportunities. Mentor entrepreneurs. Educate general and limited partners. Develop, justify, and execute investment thesis.
Years Employer Title Department
Years: 2010 to 2014 Employer: Efrim Energy, LLC Title: COO Department: Founder
Responsibilities:
Launched a renewable energy company converting livestock waste into a biomass drop-in fuel suitable for clean heat and power generation. Prepared investor material, cast wide net for global expansion and franchising. Raised $15M in equity capital and secured $30M in project financing to develop the world’s first manure-fueled biomass power plant in Maharashtra, India.
Years Employer Title Department
Years: 2010 to Present Employer: Undisclosed Title: Managing Partner Department: Founder
Responsibilities:
Envisioned and launched a third-wave coffee roasting company dedicated to producing fresh, high quality coffee. Selected, purchased, and imported green coffee beans from estates that are committed to improving coffee bean growing, harvesting, and processing and whose beans are consistently rated very high. Roasted coffee to order, delivered fresh to homes, boutique cafés, gourmet stores, and SOHOs. Managed licenses, permits, vendor relationships, purchasing and importing operations, sales, marketing, and accounting services. Established exclusive distributor agreements with specialty coffee paraphernalia companies in Japan and California.
Years Employer Title Department
Years: 2001 to Present Employer: Undisclosed Title: Managing Director Department: Founder
Responsibilities:
MTC was established in 2001 to bring together the worlds of technology, strategy, and finance. MTC works with boards and management teams to develop a long-range corporate strategy and help teams visualize divergent futures. Other services include mentoring entrepreneurs and strategic business consulting.

As an advisory services firm to venture and private equity funds and corporate venturing initiatives, MTC Venture Consulting provides insight in and around the cyber security market, on the developments across the cyber security sector around the world, an understanding of the landscape, to help funds develop and support investment thesis and excel in what is an increasingly complex yet critical landscape.
Years Employer Title Department
Years: 2007 to 2009 Employer: Microsoft Corporation Title: General Manager Department: Forefront Security Business Unit Executive
Responsibilities:
EXECUTIVE LEADERSHIP / GENERAL MANAGEMENT-Owned $150M global P&L and provided executive leadership to global team of 400 directing best practices for global distributed software development; driving world-wide outbound marketing programs through the channel sales organization; beating business revenue and units-shipped targets; and bringing business in 10% below operating budget. Achieved 5% growth during global economic downturn by launching new products on schedule, growing sales, increasing customer satisfaction, and improving employee morale. Created a productive and healthy work/life balance and fostered a culture of creativity, collaboration, speed, innovation, and excellence by creating a fun work environment. Developed and promoted key talent; identified and grew next generation of technical and marketing leaders; improved group work-health index year-over-year; and executed on corporate diversity plan. Managed and launched new and updated portfolio products beating plan-of-record, including: Intelligent Access Gateway (IAG); Unified Access Gateway (UAG); Information Security & Acceleration Server (ISA); General Application Protocol Analyzer (GAPA); and Threat Management Gateway (TMG). ENGINEERING LEADERSHIP Lead software development, technical operations, software security and QA functions, owning the successful delivery of products while contributing to the product strategy and the overall roadmap. Recruited a world-class engineering, operations, and QA team and utilized external resources to drive initiatives and high quality products. Set the technical direction for the team, managed expectations, drove the evolution of the systems architecture, made appropriate technology choices, and set and achieved realistic goals. Worked effectively with product and program managers, engineers, and sales and marketing executives to allocate resources effectively across various projects, balancing current customer/prospect needs against longer term product needs, deciding on tradeoffs as necessary. Implemented processes and scorecard metrics to ensure that the engineering organization remained efficient and focused and that the product was market ready. Functioned as an executive sponsor to key customers and partners, and mobilized the team to effectively resolve and deal with major customer issues.
Years Employer Title Department
Years: 2002 to 2007 Employer: CA Technologies Title: SVP & Chief Security Strategist Department: Business Unit Leadership Team
Responsibilities:
Grew security business billings 500% (to just over $500M in FY07) by delivering software and services that enable organizations to secure and govern their IT environments. Responsible for maintaining CA’s leadership in cyber-security by shaping the strategic direction; owning fiscal year planning; implementing scorecards and metrics to track program results and measure ROI; driving business development; and identifying new areas for growth. Identified, qualified and managed six acquisitions through closure (Silent Runner, eSecurity Online, Pest Patrol, Netegrity (NASDAQ:NETE), Tiny, and Qurb), creating and maintaining the deal radar; assembling and directing internal cross-discipline deal teams and due diligence processes; and securing approvals from company executives and Investment Committee. Responsible for partnering strategies, tactics and supporting programs; recruitment and enablement of new partners; and eco-system development including development of a world-wide partner map with primary focus on generating incremental revenue through OEM and SI relationships. Primary spokesperson and emissary to the field (global mandate) on security issues, solutions, strategies and vision with responsibility for developing and maintaining company leadership through programs to improve brand visibility and credibility. Rainmaker supporting sales team through team of executive security advisors, participating in key client meetings with C-level to open doors, overcome objections and hurdles, and close deals. Conceived and initiated carve-out and lead attempted LMBO of consumer threat management business (ultimately sold to HCL in 2007 and Updata Partners in 2011).
Years Employer Title Department
Years: 2000 to 2001 Employer: Symantec Corporation Title: SVP & CTO Department: Executive Leadership Team
Responsibilities:
Corporate CTO with global responsibility for setting technical tone, vision and strategy at world-leading enterprise and consumer cyber-security software vendor. As a member of the executive management team, attended all Board meetings, participated in strategic and business planning, operations, sales, marketing, and setting the overall business direction. Lead the core technology division leveraging the investment in shared components, technical services, R&D, and science; managed $40 million operating budget and a team of 270 responsible for global technical and product operations, and developing emerging technologies, architectures and standards. Lead the design, development, and launch of a large scale, high performing, and technically complex enterprise infrastructure application, scaling desktop and server software and infrastructure to tens of millions of users globally. Owned cross-product shared services (localization, international product engineering, and usability); the corporate software development life cycle (software manufacturing process including software assurance); and identified and corrected operational and software development inefficiencies. Conceived and built the Symantec Research Institute (precursor to Symantec Labs), a long-range research capability to address emerging enterprise security challenges, provide break-through technology, and deliver first-mover market advantages.
Successfully hired, motivated, retained and deployed talented software developers and consultants to perform against aggressive delivery goals. Directed re-organization from functional structure to self-contained business unit model. Made key investment decisions about third-party tools, build vs. buy, and fund or not fund assessments. Evangelized and sold stakeholders across the company on key engineering priorities and how they connect with larger company initiatives. Mapped inorganic growth strategy and lead more than $1 billion of acquisitions and integrations, including Axent Technologies (NASDAQ: AXNT). Created affiliations and established development partnerships and joint ventures with key research labs and universities including IBM Watson, Stanford, and Purdue. Developed financial acumen and public company experience through exposure to Board, investment bankers, analysts and other Wall Street intermediaries.
Years Employer Title Department
Years: 1996 to 1999 Employer: Finjan Software Title: Chief Technology Officer Department: Executive Leadership Team
Responsibilities:
Grew Israeli start-up into a $10M multi-national software company serving the Global 2000 as an Internet security visionary and member of the founding and senior leadership teams. Active in the creation of both direct and OEM sales channel in U.S. and Europe. Developed keen eye for alliances that took advantage of market opportunities including cultivating and maintaining tier-one OEM partnerships with IBM (SecureWay), Cisco, and Intel. Instrumental in closing key accounts including Nestle, European Parliament, Federal Reserve Bank of New York, State Farm Insurance (first $1M sale), Timken, Avery Dennison, Reuters, and REI. Primary company evangelist and spokesperson with industry analysts and press. Led product management and marketing activities through first three generations, including creating key white papers and marketing collateral; driving technology development; and asserting the company’s leadership role as a developer of advanced Internet security solutions. Founded, recruited and chaired the company’s Technical Advisory Board. Conceived and organized the Java Security Alliance, a security industry consortium, that later evolved into the Common Content Inspection API security industry standards group.
Years Employer Title Department
Years: 2015 to 2018 Employer: TrueBit Cyber Partners LLC Title: Managing Partner Department: Member
Responsibilities:
TrueBit Cyber Partners is a premier global advisor serving the cybersecurity industry. Our partners deliver truth, clarity, and confidence. Bringing decades of experience, insight, and thought-leadership to the cybersecurity market, TrueBit Cyber Partners helps cut through the noise by delivering timely and accurate advisory and decision support to your due diligence efforts. Expect to be armed with authentic intelligence and the “true bit” of information that could make all of the difference in your future investment decisions.
Years Employer Title Department
Years: 2015 to 2016 Employer: BioCatch Ltd. Title: Interim CEO Department: Executive Leadership Team
Responsibilities:
Less friction, less fraud. BioCatch delivers behavioral authentication and threat detection for mobile and Web applications. The company reduces friction associated with risky transactions and protects millions of banking and eCommerce users against cyber threats, such as, Account Takeover, Man-in-the-Browser (MitB) Malware and Remote Access (RAT) attacks.

Government Experience

Years Agency Role Description
Years: 2004 to 2007 Agency: Cyber Security Industry Alliance (www.csialliance.org) Role: Board Member and Founder Description: Cyber security industry government-facing education and lobby not-for-profit.
Years: 2003 to 2005 Agency: National Cyber Security Partnership Task Force (www.cyberpartnership.org) Role: Co-Chair Description: Developed national guidelines for Security Across the Software Development Life Cycle
Years: 2004 to 2006 Agency: U.S. Chamber of Commerce (www.uschamber.com) Role: Co-Chair, Security and Privacy Committee Description: Developed national guidelines for information security and privacy; also, member of the Homeland Security Policy Committee
Years: 2000 to 2001 Agency: Department of Justice Role: U.S. Delegate Description: G-8 on High-Tech Crime Conferences on Safety, Security, and Confidence in Cyberspace

International Experience

Years Country / Region Summary
Years: 2007 to 2009 Country / Region: Israel Summary: Senior executive at one of three Microsoft global R&D centers. Owned $150M global P&L and provided executive leadership to global team of 400 directing best practices for global distributed software development; driving world-wide outbound marketing programs through the channel sales organization; beating business revenue and units-shipped targets; and bringing business in 10% below operating budget.
Years: 2000 to 2001 Country / Region: Ireland, Japan, South Korea, China, Taiwan Summary: As global CTO, responsible for international product engineering, localization and global R&D with management of teams in multiple geographies.
Years: 2000 to 2009 Country / Region: Europe, Asia, ANZ Summary: Well-versed in the art of cross-border software development and international sales and marketing; True global management with operational experience both inside and outside the U.S. and extensive international business travel; On-the-ground leadership developed through executive roles at three public multinational corporations and one private high-tech startup. Featured presenter at numerous investor and investment banking conferences; Keynote speaker at industry trade shows across the globe as well as company user and sales events; Typically the primary executive spokesperson and business emissary to the field (global mandate) on security issues, solutions, strategies and vision; Frequently quoted or featured in global publications, media outlets, and television and radio programs.
Years: 2010 to 2014 Country / Region: India Summary: Raised $15M in equity capital, and secured $30M in project financing to develop the world’s first manure-fueled biomass power plant in Maharashtra, India.

Career Accomplishments

Associations / Societies
Chairman, Cyber Together (Israel Cybersecurity Industry Association)
Licenses / Certifications
Certified Information Systems Security Professional (CISSP) International Information Systems Security Certification Consortium (ISC^2)
Certified Information Systems Auditor (CISA) Information Systems Audit and Control Association (ISACA)
Professional Appointments
INDUSTRY AFFILIATIONS, MEMBERSHIPS & PROFESSIONAL ACTIVITIES
RSA Security Conference. Program Committee • Affiliate Member, Israel Venture Network Venture Philanthropy. Palo Alto and Tel Aviv. Board Member and Founder, Cyber Security Industry Alliance. Co-Chair, National Cyber Security Partnership Task Force, Security Across the Software Development Life Cycle, Co-Chair, Security and Privacy Committee, U.S. Chamber of Commerce. Member, Homeland Security Policy Committee, U.S. Chamber of Commerce. Member, Security Task Force, Business Roundtable. Director, American-Israel Chamber of Commerce and Industry. Co-Chair, New Markets Subcommittee of the Information Security Committee Information Technology Association of America. U.S. Delegate, (Department of State) to the U.S. - Australia Bilateral Talks Meeting on Critical Infrastructure Protection. U.S. Delegate, (Department of Justice) to the G-8 on High-Tech Crime Conferences on Safety, Security, and Confidence in Cyberspace. Member, (Department of Commerce) Bi-National Information Technology Panel U.S. - Israel Science and Technology Commission. Chairman and Founder, Common Content Inspection API Internet security industry interoperability standardization initiative. Technical Advisory Faculty Stardust Forum / NEC SOCKS Summit and Developers Conference. President, Information Systems Security Association, North Coast Chapter. Director, Information Systems Security Association, North Coast Chapter. Director, Information Systems Audit & Control Association. Northeast Ohio Chapter. President, Information Systems Audit & Control Association, Northeast Ohio Chapter. VP, Information Systems Audit & Control Association, Northeast Ohio Chapter. Association of College and University Auditors, Professional Education Committee.
Awards / Recognition
Named one of 50 most-connected people in Israel's cybersecurity industry
Publications and Patents Summary
PUBLISHED ARTICLES & CHAPTERS
Blending Corporate Governance with Information Security, Black Book on Corporate Security, Larstan Publishing. Talking Cyber Security, Cover Story, CyberDefense Magazine. Secure Content Management: Looking Beyond Antivirus Software, SearchSecurity. Secure Content Management: A New Approach to Business Security, ComputerWorld. Physics, Biology, and the New Security Theater of Operation, ITAA, The Long Campaign: Information Security in the Age of Cyberterror. Security in a Connected World, International Engineering Consortium, Annual Review of Communications Volume 54. Building Leading Technology, eBrandedBooks.com, Inside the Minds: Chief Technology Officers. Spreadsheets as Containers of Malicious Payloads, Auerbach (CRC press), Handbook of Technology in Financial Services, Jessica Keyes, ed. Haunted by Hackers: The Real Y2K Danger, San Jose Mercury News, Soapbox Forum on Business Issues. Anti-Virus Software Alone Is Not Enough, Law Technology News [American Lawyer Media Inc.] Mobile Code Security’s Place in the Corporate Network, Information Systems Audit & Control Journal. Enabling Safer Deployment of Internet Mobile Code Technologies, Auerbach (CRC press), The Handbook of Internet Management, Jessica Keyes, ed. Why We Shouldn’t Fear Java, SIGS Java Report.

Additional Experience

Training / Seminars
PUBLISHED ARTICLES & CHAPTERS
Blending Corporate Governance with Information Security, Black Book on Corporate Security, Larstan Publishing. Talking Cyber Security, Cover Story, CyberDefense Magazine. Secure Content Management: Looking Beyond Antivirus Software, SearchSecurity. Secure Content Management: A New Approach to Business Security, ComputerWorld. Physics, Biology, and the New Security Theater of Operation, ITAA, The Long Campaign: Information Security in the Age of Cyberterror. Security in a Connected World, International Engineering Consortium, Annual Review of Communications Volume 54. Building Leading Technology, eBrandedBooks.com, Inside the Minds: Chief Technology Officers. Spreadsheets as Containers of Malicious Payloads, Auerbach (CRC press), Handbook of Technology in Financial Services, Jessica Keyes, ed. Haunted by Hackers: The Real Y2K Danger, San Jose Mercury News, Soapbox Forum on Business Issues. Anti-Virus Software Alone Is Not Enough, Law Technology News [American Lawyer Media Inc.]. Mobile Code Security’s Place in the Corporate Network, Information Systems Audit & Control Journal. Enabling Safer Deployment of Internet Mobile Code Technologies, Auerbach (CRC press), The Handbook of Internet Management, Jessica Keyes, ed. Why We Shouldn’t Fear Java, SIGS Java Report.
Marketing Experience
INDUSTRY AFFILIATIONS, MEMBERSHIPS & PROFESSIONAL ACTIVITIES
RSA Security Conference, Program Committee. Affiliate Member, Israel Venture Network Venture Philanthropy, Palo Alto and Tel Aviv. Board Member and Founder, Cyber Security Industry Alliance, Co-Chair, National Cyber Security Partnership Task Force, Security Across the Software Development Life Cycle. Co-Chair, Security and Privacy Committee, U.S. Chamber of Commerce. Member, Homeland Security Policy Committee, U.S. Chamber of Commerce. Member, Security Task Force, Business Roundtable. Director, American-Israel Chamber of Commerce and Industry. Co-Chair, New Markets Subcommittee of the Information Security Committee. Information Technology Association of America U.S. Delegate, (Department of State) to the U.S. - Australia Bilateral Talks Meeting on Critical Infrastructure Protection. U.S. Delegate, (Department of Justice) to the G-8 on High-Tech Crime Conferences on Safety, Security, and Confidence in Cyberspace. Member, (Department of Commerce) Bi-National Information Technology Panel U.S. - Israel Science and Technology Commission. Chairman and Founder, Common Content Inspection API Internet security industry interoperability standardization initiative. Technical Advisory Faculty Stardust Forum / NEC SOCKS Summit and Developers Conference. President, Information Systems Security Association, North Coast Chapter. Director, Information Systems Security Association, North Coast Chapter. Director, Information Systems Audit & Control Association, Northeast Ohio Chapter. President, Information Systems Audit & Control Association, Northeast Ohio Chapter. VP, Information Systems Audit & Control Association (www.isaca.org), Northeast Ohio Chapter. Association of College and University Auditors (www.acua.org), Professional Education Committee.
Other Relevant Experience
CURRENT & PAST VENTURE PHILANTRHOPY-Mentor to Social Entrepreneur at Eitanim, an NGO helping “at-risk” youth in Netivot, Israel. As part of the Israel Venture Network’s Social Venture Program, partnered with a social entrepreneur to help close gaps in business knowledge and offer best management practices. Board Member at Livnot U’lehibanot, an NGO focusing on Jewish identity in Tsfat, Israel. Helped CEO develop strategic planning, evaluate business operations, prioritize programming, and undertake key financial decisions and investments. Mentor to CEO at Mishkan Ha’Tchelet, a ₪30M textile company in Beer-Sheva, Israel. As part of the Israel Venture Network’s Economic Reconstruction Initiative in the south of Israel, helped CEO develop strategic plan that included retail store expansion and upgrading online presence, and provided guidance vis-à-vis balancing between management and owner interests. Mentor to CEO at Katif Labs, a chemical testing laboratory in Beer-Sheva, Israel. As part of the Israel Venture Network’s Economic Reconstruction Initiative in the south of Israel, worked with the CEO to catalogue and evaluate various issues and challenges associated with the relocation of the lab from Gaza following disengagement and proposed growth strategies.

Language Skills

Language Proficiency
English Native language proficiency.
Hebrew Native language proficiency.

Fields of Expertise

cyber security, access control system, computer security system, information security, information security management, information technology security, internet security, network security system, security management, software security system, computer network security, Internet firewall, intrusion detection, data protection, strategy formulation, strategy development, long-term growth strategy, strategy, business development, business strategy, business strategy review, entrepreneurship, executive coaching, executive management, mentoring, new product development, new technology business value measurement, investment management, crowdsourcing, private equity fund, private equity, investment research, venture capital support, venture, market entry strategy, business model, information systems (discipline), information technology compliance, venture capital, business organization, internet crime, computer crime, security procedure, strategic marketing, homeland security, application security, advanced pc system, click fraud, internet fraud, fraud, computer forensics, data recovery, competitive intelligence countermeasures, corporate espionage, business plan, business operations, Internet infrastructure, Internet standard, Internet regulation, personal computer troubleshooting, business management, computer system disaster recovery planning, computer networking, computer analysis, product management, information technology management, encryption system, personal computer virus, local-area network virus, local-area network security, encryption, intranet, Internet, computer technology, computer, security system, personal microcomputer, information science, cryptography, computer virus, computer software, computer architecture, computer algorithm

Request Expert

Dev Tool:

Request: expert/cybersecurity-cybercrime-cyberwarfare-cybersecurity-technology-due-diligence-venture-capital
Matched Rewrite Rule: expert/([^/]+)(?:/([0-9]+))?/?$
Matched Rewrite Query: experts=cybersecurity-cybercrime-cyberwarfare-cybersecurity-technology-due-diligence-venture-capital&page=
Loaded Template: single-experts.php